Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (836)
  • Regensburg UB  (7)
  • 2000-2004  (838)
  • Boston, MA : Safari  (630)
  • Boston : Addison-Wesley  (175)
  • Berkeley : University of California Press
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (304 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Real Process Improvement Using the CMMI presents readers with non-academic, real-world approaches to process improvement via CMMI. The author provides concepts and techniques for CMMI-based process improvement which are as effective as they are innovative. Professionals at all levels from system engineers to CEOs will find a weal
    Note: Online resource; Title from title page (viewed February 24, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9781558606876
    Language: English
    Pages: 1 online resource (544 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Successful businesses and organizations are continually looking for ways to improve service and customer satisfaction in order to achieve long-term customer loyalty. In light of these goals, software developers must ask the question: how does customer orientation influence traditional approaches, methods, and principles of software development? In this book, a leading software architect and his team of software engineers describe how the idea of customer orientation in an organization leads to the creation of application-oriented software. This book describes what application-oriented software development is and how it can be conceptually and constructively designed with object-oriented techniques. It goes further to describe how to best fit together the many different methodologies and techniques that have been created for object-orientation (such as frameworks, platforms, components, UML, Unified Process, design patterns, and eXtreme Programming) to design and build software for real projects. This book brings together the best of research, development, and day-to-day project work to the task of building large software systems. *Written by and for developers of large, interactive, and long-lived software systems *Includes patterns of proven analysis, design, and documentation techniques *Shows how to develop an appropriate design approach and concrete software development techniques
    Note: Online resource; Title from title page (viewed October 22, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: The larger issue for Latino leaders to consider is whether they can learn from the experiences of their black colleagues as they move into the higher ranks of organizations.
    Note: Online resource; Title from title page (viewed April 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (3 pages)
    Keywords: Electronic books ; local
    Abstract: Leadership in Action contributing editor Joyce Jenkins recently spoke to Lien about her career and her views on a wide range of topics relating to her experience.
    Note: Online resource; Title from title page (viewed December 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (3 pages)
    Keywords: Electronic books ; local
    Abstract: CCL plans to examine how Chinese organizations on the verge of going global compare with both their Asian and their Western counterparts in terms of their leadership and management practices.
    Note: Online resource; Title from title page (viewed December 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (5 pages)
    Keywords: Electronic books ; local
    Abstract: Times of adversity often give rise to unpredictability, fear, anxiety, and loss of confidence. Such circumstances call for inspirational leadership, which gives employees the motivation, commitment, and productivity to take advantage of the opportunities lying on the other side of what seems to be a dark curtain of misfortune.
    Note: Online resource; Title from title page (viewed June 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (6 pages)
    Keywords: Electronic books ; local
    Abstract: Evaluating the impact of an organization's efforts to develop leaders is challenging. However, if the evaluation is set up properly, it will not only improve development efforts, and thereby the quality of leadership, but also contribute to the effectiveness of the organization.
    Note: Online resource; Title from title page (viewed February 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : HighBridge | Boston, MA : Safari
    ISBN: 9781598871920
    Language: English
    Pages: 1 online resource (9141 pages)
    Edition: 1st edition
    Keywords: Audiobooks
    Abstract: Debbie Brewster is an executive whose work group is failing. She begins meeting with a mentor her company president who helps her discover the secret of great leaders. In this accessible business fable, Debbie learns five ways in which great leaders can actually serve their followers and takes her team from worst to first.
    Note: Online resource; Title from title page (viewed November 22, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : HighBridge | Boston, MA : Safari
    ISBN: 9781598872880
    Language: English
    Pages: 1 online resource (20456 pages)
    Edition: 1st edition
    Keywords: Audiobooks
    Abstract: Short takes for the time-challenged leader. The logical follow-up to Chandler's previous best-sellers, 00 Ways to Motivate Yourself and Reinventing Yourself. Leadership can be fun if you break it into 100 easy pieces. Be the great leader you've always wanted to be with 100 pithy, persuasive alternatives to the usual way most of us try to motivate others-by downloading our anxiety onto theirs. Breakthrough concepts abound: ""Don't manage people, manage agreements."" ""Tell the truth quickly."" ""Stop talking,"" ""Soften your heart."" ""To motivate your people, first just relax."" Myths are exploded: multitasking is not a strength. We don't ""have"" self-discipline, we use it-or not. You don't have too much to do; you have one thing to do, and that's the thing you have chosen to do right now. These are tried-and-proven ways to inspire success in the people you lead-and in yourself. A vital, accessible, user-friendly guide for executives, managers, professionals, and those aspiring to reach their level.
    Note: Online resource; Title from title page (viewed October 1, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media | Boston, MA : Safari
    ISBN: 9780596528850
    Language: English
    Pages: 1 online resource (122 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Oracle designed its database products to be flexible and configurable so they would operate on a variety of hardware platforms, and they succeeded--Oracle software runs on more than seventy computer platforms, from mainframes to PC networks to handheld PDAs. The secret to this flexibility lies in the software's initialization parameters, whose numerous settings can be configured for top performance in countless environments. On the downside, however, improper settings can slow a system down; even grind it to a halt. And with so many parameters--which change from version to version of Oracle software--it's challenging for Oracle administrators to keep in mind the characteristics and optimal settings for each parameter.The Oracle Initialization Parameters Pocket Reference provides the crucial information you need to make key adjustments to your Oracle database. This concise guide is a mix of invaluable performance tips and a quick reference to Oracle's initialization parameters. The book describes each initialization parameter, indicates what category it's in--from auditing to multi-threaded server MTS--and whether it can be modified dynamically via the ALTER SESSION or ALTER SYSTEM command.In addition to the details about parameter characteristics and settings, you'll find performance tips, such as how the various parameters interact, and what the most advantageous settings are for different configurations. No other reference focuses exclusively on these initialization parameters--an absolute must for anyone working with an Oracle database.Presented in a handy, easy-to-use format, the Oracle Initialization Parameters Pocket Reference is a welcome alternative for anyone who's struggled to memorize the best configuration settings or gone back and forth to online resources, trying to figure out what works. O'Reilly's Pocket References put the information you need close at hand where you need it most. This guide will keep your Oracle databases operating at peak performance.
    Note: Online resource; Title from title page (viewed August 25, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Berkeley : University of California Press
    ISBN: 1417508132 , 0520930096 , 9780520930094 , 9781417508136
    Language: English
    Pages: xv, 295 p , ill., maps , 24 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Early Upper Paleolithic beyond Western Europe
    RVK:
    Keywords: Paleolithic period ; Paleolithic period ; Tools, Prehistoric ; Tools, Prehistoric ; Paleolithic period Europe, Eastern ; Paleolithic period Asia, Central ; Tools, Prehistoric Europe, Eastern ; Tools, Prehistoric Asia, Central ; Paleolithic period ; Paleolithic period ; Tools, Prehistoric ; Tools, Prehistoric ; Tools, Prehistoric ; Paleolithic period ; Tools, Prehistoric ; Paleolithic period ; Paleolithic period ; Paleolithic period ; Tools, Prehistoric ; Tools, Prehistoric ; Electronic books ; Tools, Prehistoric ; HISTORY ; Ancient ; General ; Antiquities ; Paleolithic period ; SOCIAL SCIENCE ; Archaeology ; Paläolithikum ; Europe, Eastern Antiquities. ; Asia, Central Antiquities. ; Europe, Eastern Antiquities ; Asia, Central Antiquities ; Asia, Central ; Europe, Eastern ; Asia, Central Antiquities ; Europe, Eastern Antiquities ; Europe, Eastern Antiquities ; Asia, Central Antiquities ; Europe, Eastern Antiquities. ; Asia, Central Antiquities. ; Central Asia ; Eastern Europe ; Asien ; Osteuropa ; Electronic books. ; Electronic book ; Electronic books. ; Electronic books ; Aufsatzsammlung ; Osteuropa ; Asien ; Paläolithikum ; Osteuropa ; Asien ; Paläolithikum
    Abstract: This volume brings together prominent archaeologists working in areas outside Western Europe to discuss the most recent evidence for the origins of the early Upper Paleolithic and its relationship to the origin of modern humans. With a wealth of primary data from archaeological sites and regions that have never before been published and discussions of materials from difficult-to-find sources, the collection urges readers to reconsider the process of modern human behavioral origins. Archaeological evidence continues to play a critical role in debates over the origins of anatomically modern humans. The appearance of novel Upper Paleolithic technologies, new patterns of land use, expanded social networks, and the emergence of complex forms of symbolic communication point to a behavioral revolution beginning sometime around 45,000 years ago. Until recently, most of the available evidence for this revolution derived from Western European archaeological contexts that suggested an abrupt replacement of Mousterian Middle Paleolithic with Aurignacian Upper Paleolithic adaptations. In the absence of fossil association, the behavioral transition was thought to reflect the biological replacement of archaic hominid populations by intrusive modern humans. The contributors present new archaeological evidence that tells a very different story: The Middle-Upper Paleolithic transitions in areas as diverse as the Levant, Eastern-Central Europe, and Central and Eastern Asia are characterized both by substantial behavioral continuity over the period 45,000-25,000 years ago and by a mosaic-like pattern of shifting adaptations. Together these essays will enliven and enrich the discussion of the shift from archaic to modern behavioral adaptations
    Abstract: This volume brings together prominent archaeologists working in areas outside Western Europe to discuss the most recent evidence for the origins of the early Upper Paleolithic and its relationship to the origin of modern humans. With a wealth of primary data from archaeological sites and regions that have never before been published and discussions of materials from difficult-to-find sources, the collection urges readers to reconsider the process of modern human behavioral origins. Archaeological evidence continues to play a critical role in debates over the origins of anatomically modern humans. The appearance of novel Upper Paleolithic technologies, new patterns of land use, expanded social networks, and the emergence of complex forms of symbolic communication point to a behavioral revolution beginning sometime around 45,000 years ago. Until recently, most of the available evidence for this revolution derived from Western European archaeological contexts that suggested an abrupt replacement of Mousterian Middle Paleolithic with Aurignacian Upper Paleolithic adaptations. In the absence of fossil association, the behavioral transition was thought to reflect the biological replacement of archaic hominid populations by intrusive modern humans. The contributors present new archaeological evidence that tells a very different story: The Middle-Upper Paleolithic transitions in areas as diverse as the Levant, Eastern-Central Europe, and Central and Eastern Asia are characterized both by substantial behavioral continuity over the period 45,000-25,000 years ago and by a mosaic-like pattern of shifting adaptations. Together these essays will enliven and enrich the discussion of the shift from archaic to modern behavioral adaptations
    Description / Table of Contents: CoverCONTENTS -- LIST OF FIGURES AND TABLES -- PREFACE -- 1. On the Difficulty of the Middle-Upper Paleolithic Transitions -- 2. Early Upper Paleolithic Backed Blade Industries in Central and Eastern Europe -- 3. Continuities, Discontinuities, and Interactions in Early Upper Paleolithic Technologies: A View from the Middle Danube -- 4. Koulichivka and Its Place in the Middle-Upper Paleolithic Transition in Eastern Europe -- 5. Origins of the European Upper Paleolithic, Seen from Crimea: Simple Myth or Complex Reality? -- 6. The Beginning of the Upper Paleolithic on the Russian Plain -- 7. Emergence of the Levantine Upper Paleolithic: Evidence from the Wadi al-Hasa -- 8. New Perspectives on the Initial Upper Paleolithic: The View from 220;231;aizli Cave, Turkey -- 9. The Upper Paleolithic in Western Georgia -- 10. The Aurignacian in Asia -- 11. The Middle-Upper Paleolithic Interface in Former Soviet Central Asia -- 12. The Early Upper Paleolithic of Siberia -- 13. Origin of the Upper Paleolithic in Siberia: A Geoarchaeological Perspective -- 14. Initial Upper Paleolithic Blade Industries from the North-Central Gobi Desert, Mongolia -- 15. The Initial Upper Paleolithic at Shuidonggou, Northwestern China -- 16. The Early Upper Paleolithic and the Origins of Modern Human Behavior -- REFERENCES -- LIST OF CONTRIBUTORS -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
    Note: Includes bibliographical references (p. 249-283) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Berkeley : University of California Press
    ISBN: 1417508213 , 9781417508211 , 9780520937208 , 0520937201
    Language: English
    Pages: xii, 292 p , 23 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Symptoms of modernity
    DDC: 305.892404361309049
    Keywords: Jews Social conditions 20th century. ; Gays Social conditions 20th century. ; Nationalism Social aspects ; Nationalism Social aspects ; Austria ; Gays Social conditions 20th century ; Nationalism Social aspects ; Jews Social conditions 20th century ; Jews Social conditions ; 20th century ; Austria ; Vienna ; Gays Social conditions ; 20th century ; Austria ; Vienna ; Jews Social conditions 20th century ; Gays Social conditions 20th century ; Nationalism Social aspects ; Jews Social conditions 20th century. ; Gays Social conditions 20th century. ; Nationalism Social aspects ; Jews Social conditions ; 20th ; Austria ; Vienna ; Social Science ; History ; Ethnic relations ; Gays ; Social conditions ; Jews ; Social conditions ; Manners and customs ; Nationalism ; Social aspects ; Social policy ; SOCIAL SCIENCE ; Discrimination & Race Relations ; SOCIAL SCIENCE ; Minority Studies ; SOCIAL SCIENCE ; Anthropology ; Cultural ; Homosexueller ; Juden ; Soziale Situation ; Vienna (Austria) Ethnic relations. ; Vienna (Austria) Social life and customs 20th century. ; Austria History 1955- ; Austria History 1955- ; Vienna (Austria) Ethnic relations ; Vienna (Austria) Social life and customs ; 20th century ; Austria History ; 1955- ; Austria Social policy ; Austria ; Austria ; Vienna ; Austria Social policy ; Vienna (Austria) Ethnic relations ; Vienna (Austria) Social life and customs 20th century ; Austria Social policy ; Vienna (Austria) Ethnic relations ; Vienna (Austria) Social life and customs 20th century ; Vienna (Austria) Ethnic relations. ; Vienna (Austria) Social life and customs 20th century. ; Austria Social policy. ; Austria Social policy. ; Austria ; Vienna ; Austria ; Wien ; Electronic books. ; Electronic books. ; Electronic books History ; Wien ; Juden ; Homosexueller ; Soziale Situation ; Geschichte 1990-2000 ; Wien ; Juden ; Homosexueller ; Soziale Situation ; Geschichte 1990-2000
    Abstract: In the 1990s, Vienna's Jews and queers abandoned their clandestine existence and emerged into the city's public sphere in unprecedented numbers. 'Symptoms of Modernity' traces this development in the context of Central European history; Since 1900
    Note: Includes bibliographical references (p. 271-286) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Berkeley : University of California Press
    ISBN: 1417508213
    Language: English
    Pages: 1 Online-Ressource (xii, 292 Seiten) , 23 cm
    Edition: Online_Ausgabe Boulder, Colo NetLibrary 2004 E-Books von NetLibrary Sonstige Standardnummer des Gesamttitels: 22382847
    Parallel Title: Reproduktion von Bunzl, Matti Symptoms of modernity
    DDC: 305.892404361309049
    RVK:
    Keywords: Geschichte 1900-2000 ; Geschichte 1990-2000 ; Gays - Social conditions - 20th century - Austria ; Jews - Social conditions - 20th century - Austria ; Nationalism - Social aspects - Austria ; Vienna ; Alltag, Brauchtum ; Geschichte ; Gesellschaft ; Juden ; Nationalismus ; Gays Social conditions 20th century ; Jews Social conditions 20th century ; Nationalism Social aspects ; Soziale Situation ; Homosexueller ; Juden ; Austria - History - 1955- ; Austria - Social policy ; Vienna (Austria) - Ethnic relations ; Vienna (Austria) - Social life and customs - 20th century ; Wien ; Österreich ; Austria History 1955- ; Austria Social policy ; Vienna (Austria) Ethnic relations ; Vienna (Austria) Social life and customs 20th century ; Wien ; Electronic books ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books History ; Wien ; Juden ; Homosexueller ; Soziale Situation ; Geschichte 1990-2000
    Note: Includes bibliographical references (p. 271-286) and index
    URL: Full text  (Click to View (Currently Only Available on Campus))
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: Today's leaders are being asked to create work environments in which bridging differences across a wide range of social identities—including gender, race, religion, age, culture, and ethnicity—becomes a core competency for everyone in the organization.
    Note: Online resource; Title from title page (viewed August 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 8131741281 , 9788131741283
    Language: English
    Pages: 1 online resource (xxxv, 471 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 005.8
    Keywords: Computer security ; Computer software Testing ; Hackers ; Computer Security ; Sécurité informatique ; Pirates informatiques ; Hackers ; Computer security ; Computer software ; Testing
    Abstract: Praise for Exploiting Software " Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design--a key change from where we are today!" -- Tony Scott Chief Technology Officer, IS&S General Motors Corporation "It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play." -- Bruce Schneier Chief Technology Officer Counterpane Author of Beyond Fear and Secrets and Lies " Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the 'worm of the day' phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security." -- Elinor Mills Abreu Reuters' correspondent "Police investigators study how criminals think and act. Military strategists learn about the enemy's tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the 'white hats' understand how the 'black hats' operate. Through extensive examples and 'attack patterns,' this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security." -- Jeremy Epstein Director, Product Security & Performance webMethods, Inc. "A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting software vulnerabilities, along with detailed examples from real software exploits. Exploiting Software is essential reading for anyone responsible for placing software in a hostile environment--that is, everyone who writes or installs programs that run on the Internet." -- Dave Evans, Ph.D. Associate Professor of Computer Science University of Virginia "The root cause for most of today's Internet hacker exploits and malicious software outbreaks are buggy software and faulty security software deployment. In Exploiting Software, Greg Hoglund and Gary McGraw help us in an interesting and provocative way to better defend ourselves against malicious hacker attacks on those software loopholes. The information in this book is an essential reference that needs to be understood, digested, and aggressively addressed by IT and information security professionals everywhere." -- Ken Cutler, CISSP, CISA Vice President, Curriculum Development & Professional Services, MIS Training Institute "This book describes the threats to software in concrete, understandable, and frightening detail. It also discusses how to find these problems before the bad folks do. A valuable addition to every programmer's and security person's library!" -- Matt Bishop, Ph.D. Professor of Computer Science University of California at Davis Author of Computer Security: Art and Science "Whether we slept through software engineering classes or paid attention, those of us who build things remain responsible for achieving meaningful and measurable vulnerability reductions. If you can't afford to stop all software manufacturing to teach your engineers how to build secure software from the ground up, you should at least increase awareness in your organization by demanding that they read Exploiting Software. This book clearly demonstrates what happens to broken software in the wild." -- Ron Moritz, CISSP Senior Vice President, Chief Security Strategist Computer Associates " Exploiting Software is the most up-to-date technical treatment of software security I have seen. If you worry about software and application vulnerability, Exploiting Software is a must-read. This book gets at all the timely and important issues surrounding software security in a technical, but still highly readable and engaging, way. Hoglund and McGraw have done an excellent job of picking out the major ideas in software exploit and nicely organizing them to make sense of the software security jungle." -- George Cybenko, Ph.D. Dorothy and Walter Gramm Professor of Engineering, Dartmouth Founding Editor-in-Chief, IEEE Security and Privacy "This is a seductive book. It starts with a simple story, telling about hacks and cracks. It draws you in with anecdotes, but builds from there. In a f.
    Note: Includes bibliographical references (pages 449-451) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (4 pages)
    Keywords: Electronic books ; local
    Abstract: Hallie Preskill is a prominent figure in evaluation. A professor in the Organizational Learning and Instructional Technologies graduate program at the University of New Mexico, Albuquerque, She recently spoke with CCL's Jannifer Martineau
    Note: Online resource; Title from title page (viewed February 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: Many people start their careers with little or no leadership experience and no clear ambition toward leadership but somehow along the way leverage their experiences into a wealth of leadership talent and impressive track records.
    Note: Online resource; Title from title page (viewed April 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Language: English
    Pages: xxx, 337 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.36
    Keywords: Computer architecture ; Information technology ; Middleware ; Electronic books ; local
    Abstract: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written by and for IT professionals, IT Architectures and Middleware, Second Edition, will help you rise above the conflicts of new business objectives, new technologies, and vendor wars, allowing you to think clearly and productively about the particular challenges you face. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements emerging from the rise of e-commerce and distributed, integrated systems. It offers a concise overview of middleware technology alternatives and distributed systems. Numerous increasingly complex examples are incorporated throughout, and the book concludes with some short case studies. Topics covered include: Middleware technology review Key principles of distributed systems: resiliency, performance and scalability, security, and systems management Information access requirements and data consistency Application integration design Recasting existing applications as services In this new edition, with updates throughout, coverage has been expanded to include: Service-oriented architecture concepts Web services and .NET technology A more structured approach to system integration design
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 268 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software. The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of functionality that will be valuable to real users. In User Stories Applied , Mike Cohn provides you with a front-to-back blueprint for writing these user stories and weaving them into your development lifecycle. You'll learn what makes a great user story, and what makes a bad one. You'll discover practical ways to gather user stories, even when you can't speak with your users. Then, once you've compiled your user stories, Cohn shows how to organize them, prioritize them, and use them for planning, management, and testing. User role modeling: understanding what users have in common, and where they differ Gathering stories: user interviewing, questionnaires, observation, and workshops Working with managers, trainers, salespeople and other "proxies" Writing user stories for acceptance testing Using stories to prioritize, set schedules, and estimate release costs Includes end-of-chapter practice questions and exercises User Stories Applied will be invaluable to every software developer, tester, analyst, and manager working with any agile method: XP, Scrum... or even your own home-grown approach.
    Note: "A Kent Beck signature book"--Cover. - Includes bibliographical references (p. 259-262) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1〉 , ill. ; , 25 cm. +
    DDC: 005.2/768
    Keywords: Microsoft .NET Framework ; Electronic books ; local
    Abstract: Edited by a Lead Program Manager on Microsoft's .NET Framework team, .NET Framework Standard Library Annotated Reference, Volume 1, is the definitive reference for the .NET Framework base class library. This book utilizes extensive annotations and code samples from the creators of the technology to move beyond the online documentation and provide .NET developers with a dictionary-style reference to the most-used parts of the Framework. This volume covers a subset of the ISO CLI Standards, including the Base Class Library and the Extended Numerics Library. In the printed book you will find informative overviews of each namespace covered and an easy-to-follow alphabetic reference of types in the standard, including type-level descriptions, sample code with output, and annotations from the design team and standardization committee. With the ECMA and ISO standards as its core, this book includes: Annotations from key members of the Microsoft design team and the Standardization committee. Comments cover everything from design rationale and history to common problems and shortcomings. An overview of each namespace, describing its functionality and the inheritance hierarchy of types it defines. Type descriptions. Each type is covered in its own chapter, with a detailed description of how the type is to be used and a quick reference of the C# declaration syntax for all members defined on the type. Also noted: which members are only available in the Microsoft implementation of the .NET Framework, which are not available in the .NET Compact Framework, and which are only available in V1.1 of the .NET Framework. Code samples. Types are illustrated by fully compilable code samples with output included. Reference tabs and an exhaustive index, which allow readers to quickly and easily navigate the text. Reusable source code for more than one thousand samples. All code has been tested with versions 1.0, 1.1, and the 2.0 technical preview of the .NET Framework, and, where appropriate, with the .NET Compact Framework.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 336 p. , ill. ; , 28 cm
    DDC: 621.39/9
    Keywords: Automatic speech recognition ; Human-computer interaction ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: This book is a comprehensive and authoritative guide to voice user interface (VUI) design. The VUI is perhaps the most critical factor in the success of any automated speech recognition (ASR) system, determining whether the user experience will be satisfying or frustrating, or even whether the customer will remain one. This book describes a practical methodology for creating an effective VUI design. The methodology is scientifically based on principles in linguistics, psychology, and language technology, and is illustrated here by examples drawn from the authors' work at Nuance Communications, the market leader in ASR development and deployment. The book begins with an overview of VUI design issues and a description of the technology. The authors then introduce the major phases of their methodology. They first show how to specify requirements and make high-level design decisions during the definition phase. They next cover, in great detail, the design phase, with clear explanations and demonstrations of each design principle and its real-world applications. Finally, they examine problems unique to VUI design in system development, testing, and tuning. Key principles are illustrated with a running sample application. A companion Web site provides audio clips for each example: www.VUIDesign.org The cover photograph depicts the first ASR system, Radio Rex: a toy dog who sits in his house until the sound of his name calls him out. Produced in 1911, Rex was among the few commercial successes in earlier days of speech recognition. Voice User Interface Design reveals the design principles and practices that produce commercial success in an era when effective ASRs are not toys but competitive necessities.
    Note: Includes bibliographical references (p. 315-324) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.7/6
    Keywords: Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: p. cm
    DDC: 005.7/13769
    Keywords: Microsoft Windows server ; Computer storage devices ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking." -Tom Clark, Director, Technical Marketing, Nishan Systems The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage. Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products. Key topic coverage includes: Direct Attached Storage, including the new Windows Storport driver model Fibre Channel Storage Area Networks (SANs) Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems Storage management, including the new Windows Virtual Disk Service IP Storage and Infiniband High availability, including RAID mirroring as well as multi path I/O solutions This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage. 032112698XB06302003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 150 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer architecture ; Computer software ; Development ; Electronic books ; local
    Abstract: "A readable and much needed introduction to MDA." --Dr. Jim Arlow, coauthor of UML and the Unified Process (Addison-Wesley, 2002) and Enterprise Patterns and MDA (Addison-Wesley, 2004) "This book provides an excellent introduction to the ideas and technologies that will form the foundation of the model-driven architecture over the coming years. I recommend it wholeheartedly." --Dr. Andy Evans, Managing Director, Xactium Limited, UK "Excellent job of distilling MDA down to its core concepts." --Krzysztof Czarnecki, Univeristy of Waterloo, coauthor of Generative Programming (Addison-Wesley, 2000) As systems have grown more crucial to the operations of organizations worldwide, so too have the costs associated with building and maintaining them. Enter model-driven architecture (MDA), a standard framework from the Object Management Group (OMG) that allows developers to link object models together to build complete systems. MDA prevents design decisions from being intertwined with the application and keeps it independent of its implementation. The result is an application that can be combined with other technologies as well as other applications, and models that become highly reusable assets. MDA Distilled is an accessible introduction to the MDA standard and its tools and technologies. The book describes the fundamental features of MDA, how they fit together, and how you can use them in your organization today. You will also learn how to define a model-driven process for a project involving multiple platforms, implement that process, and then test the resulting system. MDA Distilled will help you understand: The MDA framework, including the platform-independent model (PIM) and the platform-specific model (PSM) The Meta Object Facility (MOF)--the OMG's adopted standard for metamodeling Horizontal, vertical, and merging mappings between models Building marks and marking models Elaborating models, including viewing generated models, and managing manual changes Building executable models with Executable UML Agile MDA development Developers and architects can dramatically improve productivity, portability, interoperability, and maintenance with MDA. Find out how with this essential reference, and quickly learn how to harness the significant power of this new framework.
    Note: Includes bibliographical references (p. 143-144) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 386 p. , ill. ; , 23 cm. +
    DDC: 005
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: "I had a question about how to use a new Eclipse 3.0 feature, job scheduling, so I thought I would try out this book. I immediately found the answer with a concise explanation. Cool!" --Erich Gamma Official Eclipse 3.0 FAQs is the convenient source for answers to your most crucial questions about writing Eclipse plug-ins. Whether you're creating simple extensions for personal use or commercial Eclipse-based applications, you'll find hundreds of concise solutions here--including many that aren't answered anywhere else. John Arthorne and Chris Laffra have worked with Eclipse technology since the very beginning; both are active members of the Eclipse development community and frequently answer questions on Eclipse newsgroups and mailing lists. Here, they cover an extraordinary range of topics, from workspace management to documentation, SWT to JFace, JDT to natural language support. Many FAQs include code samples and references to other information, making the book an invaluable desk reference for anyone working with Eclipse. Just a few of the 350+ questions answered here... How do I upgrade Eclipse? Page 29 What is new in Eclipse 3.0? Page 34 How can I add my views and actions to an existing perspective? Page 187 How do I set up a Java project to share in a repository? Page 58 How do I declare my own extension point? Page 74 How do I display a Web page in SWT? Page 141 How do I support multiple natural languages in my plug-in messages? Page 253 How do I save settings for a dialog or wizard? Page 166 How do I provide syntax coloring in an editor? Page 269 How do I hook into global actions, such as Copy and Delete? Page 225 How do I create a Rich Client application? Page 241 What is the purpose of activities? Page 229 How do I create and examine an AST? Page 369
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 277 p. , ill. ; , 24 cm
    DDC: 005.1/2
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: Please note - there is now a second edition of this book available, with the ISBN of 0321658396. "Jim Highsmith is one of a few modern writers who are helping us understand the new nature of work in the knowledge economy." -Rob Austin, Assistant Professor, Harvard Business School "This is the project management book we've all been waiting for-the book that effectively combines Agile methods and rigorous project management. Not only does this book help us make sense of project management in this current world of iterative, incremental Agile methods, but it's an all-around good read!" -Lynne Ellen, Sr. VP & CIO, DTE Energy "Finally a book that reconciles the passion of the Agile Software movement with the needed disciplines of project management. Jim's book has provided a service to all of us." -Neville R(oy) Singham, CEO, ThoughtWorks, Inc. "The world of product development is becoming more dynamic and uncertain. Many managers cope by reinforcing processes, adding documentation, or further honing costs. This isn't working. Highsmith brilliantly guides us into an alternative that fits the times." -Preston G. Smith, principal, New Product Dynamics/coauthor, Developing Products in Half the Time One of the field's leading experts brings together all the knowledge and resources you need to use APM in your next project. Jim Highsmith shows why APM should be in every manager's toolkit, thoroughly addressing the questions project managers raise about Agile approaches. He systematically introduces the five-phase APM framework, then presents specific, proven tools for every project participant. Coverage includes: Six principles of Agile Project Management How to capitalize on emerging new product development technologies Putting customers at the center of your project, where they belong Creating adaptive teams that respond quickly to changes in your project's "ecosystem" Which projects will benefit from APM-and which won't APM's five phases: Envision, Speculate, Explore, Adapt, Close APM practices, including the Product Vision Box and Project Data Sheet Leveraging your PMI skills in Agile environments Scaling APM to larger projects and teams For every project manager, team leader, and team member
    Note: Includes bibliographical references (p. 263-267) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 564 p. , ill. ; , 24 cm
    DDC: 005.7/137682
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic books ; local
    Abstract: "Scott Schnoll has the amazing ability to present deeply technical information in an easy-to-understand, light-hearted way. This book is a must-read for anyone who is implementing Exchange 2003." - Paul Bowden , lead program manager, Exchange Server Development, Microsoft Corporation "Scott Schnoll's clear, concise writing style and diverse knowledge makes his Exchange 2003 book readable and valuable to anyone deploying, inheriting, or considering Exchange Server 2003. An excellent, thorough, all-purpose Exchange 2003 book." - William Lefkovics , senior messaging and systems analyst,eEye Digital Security "This is one Exchange Server book that you'll actually enjoy reading from cover to cover. You won't want to put it down . . . I didn't! It's easy to read, yet it contains all of the essential information that you need to know." Christopher Meirick , co-blogger, MS Exchange Blog: http://www.msexchange.co.uk "Scott Schnoll's knowledge of Exchange is second to none, and he has the ability to take very technical topics and explain them in a manner that is easy to digest. This book should be in every Exchange administrator's toolkit." Mark Fugatt , MCT,Exchange MVP "I really enjoyed reading this book. I found it to be extremely informative, especially in covering the new features of Exchange 2003. I have no doubts in recommending this book to those who are serious about Exchange 2003." - Neil Hobson , Exchange MVP, lead messaging consultant,Silversands "Scott has written the essential administrative guide for Exchange 2003 deployment. Not only covering the 'how-to,' but also truly exploring the 'what-if' scenarios as well." - Kevin T. Price , deputy chief technical officer, CMS Information Services, Inc. "An essential technical reference containing the critical information necessary for successful administration and deployment of Exchange Server 2003. New features, removed features-this book covers it all." - James V. Walker , consultant "Scott Schnoll's clear, concise writing style and diverse knowledge make his Exchange 2003 book readable and valuable to anyone deploying, inheriting, or considering Exchange Server 2003. An excellent, thorough, all-purpose Exchange book." - William Lefkovics, Senior Messaging and Systems Analyst, eEye Digital Security Nearly three years in the making, Exchange Server 2003 is the most reliable and secure messaging solution that Microsoft has ever produced. Microsoft Exchange Server 2003 Distilled is a practical, ha...
    Note: Includes bibliographical references (510-525) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 407 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Microsoft Visual Basic for Windows ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Praise for The Visual Basic .NET Programming Language "There is no substitute to getting the inside scoop directly from a book written by the father of a programming language such as Bjarne Stroustrup for C++, James Gosling for Java and Alan Cooper for the original version of Visual Basic. Paul Vick, the father of Visual Basic .NET, explains the whys and hows of this exciting new language better than any other human being on the planet." - Ted Pattison , Barracuda.NET " The Visual Basic .NET Programming Language includes nuances that in all my use and study of VB .NET, I haven't seen discussed anywhere else. For example, I learned that you can use the Imports statement to import an Enum name, so that you needn't refer to the enum in all its uses. In addition, I learned that the dictionary lookup operator, '!', works in VB .NET-I thought this one had been retired. In any case, if you're searching for a book that covers all the language syntax issues, and more, Paul Vick's book is a great place to look." - Ken Getz , Senior Consultant, MCW Technologies, LLC "This book is an excellent stepping stone for Visual Basic developers wanting to get their toes wet in the .NET waters. Paul's presentation of the core topics all VB developers should tackle first is clear, concise, and unlike other books in the genre, does not overwhelm the reader. The VB6 vs. VB.NET task-oriented approach guides you through the new language and OO features, and then moves to basic threading and other CLR topics-as well as to the key points in the COM to .NET transition-in a well thought-out sequence. If you've been holding out on VB .NET, this is a great book to get you started." - Klaus H. Probst, Sr. Consultant/Architect, Spherion Technology Services, Microsoft MVP "There is no shortage of VB .NET books in the market, but this is the only book straight from the creators. While that is an excellent reason in itself for reading this book, it is the brevity and clarity of the content, along with the examples, that makes this book a must-have." - Amit Kalani , Developer "Overall, I liked this book and it definitely benefited me. I learned new things I didn't see anywhere else and I'll certainly put these to good use in the future. Paul's book makes a great reference manual for intermediate and advanced VB .NET developers." - Philip Williams , System Engineer, LDC Direct "This book contains a lot of great information I have seen nowhere else and addresses issues that other boo...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Agile/iterative methods: From business case to successful implementation This is the definitive guide for managers and students to agile and iterative development methods: what they are, how they work, how to implement them- and why you should. Using statistically significant research and large-scale case studies, noted methods expert Craig Larman presents the most convincing case ever made for iterative development. Larman offers a concise, information-packed summary of the key ideas that drive all agile and iterative processes, with the details of four noteworthy iterative methods: Scrum, XP, RUP, and Evo. Coverage includes: Compelling evidence that iterative methods reduce project risk Frequently asked questions Agile and iterative values and practices Dozens of useful iterative and agile practice tips New management skills for agile/iterative project leaders Key practices of Scrum, XP, RUP, and Evo Whether you're an IT executive, project manager, student of software engineering, or developer, Craig Larman will help you understand the promise of agile/iterative development, sell it throughout your organizationaeand transform the promise into reality .
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards. The authors cover virtually every facet of C++ programming: design and coding style, functions, operators, class design, inheritance, construction/destruction, copying, assignment, namespaces, modules, templates, genericity, exceptions, STL containers and algorithms, and more. Each standard is described concisely, with practical examples. From type definition to error handling, this book presents C++ best practices, including some that have only recently been identified and standardized-techniques you may not know even if you've used C++ for years. Along the way, you'll find answers to questions like What's worth standardizing--and what isn't? What are the best ways to code for scalability? What are the elements of a rational error handling policy? How (and why) do you avoid unnecessary initialization, cyclic, and definitional dependencies? When (and how) should you use static and dynamic polymorphism together? How do you practice "safe" overriding? When should you provide a no-fail swap? Why and how should you prevent exceptions from propagating across module boundaries? Why shouldn't you write namespace declarations or directives in a header file? Why should you use STL vector and string instead of arrays? How do you choose the right STL search or sort algorithm? What rules should you follow to ensure type-safe code? Whether you're working alone or with others, C++ Coding Standards will help you write cleaner code--and write it faster, with fewer hassles and less frustration.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Bring new power, performance, and scalability to your existing Perl code! Cure whatever ails your Perl code! Maintain, optimize, and scale any Perl software... whether you wrote it or not Perl software engineering best practices for enterprise environments Includes case studies and code in a fun-to-read format Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of Perl Debugged, has written the first systematic guide to Perl software engineering. Through extensive examples, he shows how to bring powerful discipline, consistency, and structure to any Perl program-new or old. You'll discover how to: Scale existing Perl code to serve larger network, Web, enterprise, or e-commerce applications Rewrite, restructure, and upgrade any Perl program for improved performance Bring standards and best practices to your entire library of Perl software Organize Perl code into modules and components that are easier to reuse Upgrade code written for earlier versions of Perl Write and execute better tests for your software...or anyone else's Use Perl in team-based, methodology-driven environments Document your Perl code more effectively and efficiently If you've ever inherited Perl code that's hard to maintain, if you write Perl code others will read, if you want to write code that'll be easier for you to maintain, the book that comes to your rescue is Perl Medic. If you code in Perl, you need to read this book.-Adam Turoff, Technical Editor, The Perl Review. Perl Medic is more than a book. It is a well-crafted strategy for approaching, updating, and furthering the cause of inherited Perl programs.-Allen Wyke, co-author of several computer books including JavaScript Unleashed and Pure JavaScript. Scott's explanations of complex material are smooth and deceptively simple. He knows his subject matter and his craft-he makes it look easy. Scott remains relentless practical-even the 'Analysis' chapter is filled with code and tests to run.-Dan Livingston, author of several computer books including Advanced Flash 5: Actionscript in Action
    Note: Includes bibliographical references (p. 303-306) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Language: English
    Pages: xxii, 517 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Intranets (Computer networks) ; Design and construction ; Web portals ; Design ; Electronic books ; local
    Abstract: Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers is the practical guide to designing, developing, and implementing Web portals using Microsoft servers and the .NET Framework. James J. Townsend provides portal development teams with a working developer's overview of the concepts, technologies, and products used in building successful corporate portals. Readers learn how to create a portal architecture based on Microsoft .NET and integrate multiple server technologies and components to create a powerful portal solution. After introducing basic concepts in portal development, Townsend describes the Microsoft portal strategy and the importance of Web services to .NET. Readers become familiar with the .NET portal framework and the roles of Microsoft's SQL Server, Commerce Server (MCS), SharePoint Portal Server, BizTalk Server, Internet Security and Acceleration (ISA) Server, Content Management Server (MCMS), and related technologies. Key topic coverage includes security feature integration, personalization, content management, enterprise application integration (EAI), collaboration features, providing full search capability, and achieving scalability. A companion Web site features all the source code used in examples throughout the book. This book provides practical development advice in answer to questions commonly faced by portal developers, such as: When does it make sense to develop or deploy a Web service? Page 87 Is there a straightforward way to mitigate almost all potential security risks? Page 197 How do you get the most out of personalization? Page 266 How can you measure the return on investment for content management? Page 269 Which is the best online conferencing solution for your organization? Page 403 When and how should you scale up and/or out? Page 446 Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers shows you how to choose and integrate the right products and build the best portal for your organization.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 456 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Software patterns ; UML (Computer science) ; Electronic books ; local
    Abstract: Steven John Metsker explains how to use C# as an object-oriented language, using design patterns to create clean code while taking advantage of the extensive Microsoft(R) .NET Framework Class Libraries. For all 23 classic "Gang of Four" design patterns, Metsker offers detailed code examples utilizing C# and the .NET Framework--as well as programming exercises crafted to help you rapidly build expertise. His exercises and explanations make extensive use of the Unified Modeling Language, helping you build your skills in this standard notation. Design patterns covered include: Interfaces: Adapter, Facade, Composite, and Bridge Responsibility: Singleton, Observer, Mediator, Proxy, Chain of Responsibility, and Flyweight Construction: Builder, Factory Method, Abstract Factory, Prototype, and Memento Extensions: Decorator, Iterator, and Visitor If you've already used design patterns in other languages, Design Patterns in C# will deepen your understanding, build your confidence, and help you apply them to any C# project. If you're a Microsoft programmer who's new to design patterns, this book will be an ideal practical introduction. www.awprofessional.com/patterns/ ADDISON-WESLEY PROFESSIONAL Pearson Education ISBN: 0-321-12697-1
    Note: Includes bibliographical references (p. 439-440) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxv, 505 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Query languages (Computer science) ; Electronic books ; local
    Abstract: "An excellent, early look at the emerging XML Query standard. The chapters on surprises and gotchas alone are worth the price of admission!" - Ashok Malhotra , Architect, Microsoft "XQuery is the most important XML standard to emerge in recent years, and is a language with which anyone using XML on a regular basis should become acquainted. Michael Brundage's accessible introduction to XQuery provides enough information on all aspects of the standard, including its dark corners, to allow any XML developer to jump right in and start coding." - Damien Fisher , Kernel Team Member, Soda Technologies Pty Ltd "This book does an excellent job of distilling the essentials of XQuery in an understandable, straightforward and easily digestable manner. This book has already become an indispensible part of my library and is a welcome addition to my XML repertoire." - Dare Obasanjo , Program Manager, Microsoft Corporation "Simply put, the emerging XQuery standard adds enormous value to XML data and this book is your key to unlocking that value. Here in one stop you will find an accessible introduction to XQuery and a complete reference. Practitioners will particularly value the sections on XQuery idioms and surprises where Michael shares his tricks of the trade." - Dave Van Buren , Project Manager, Jet Propulsion Laboratory "It's both a stupendous reference on XQuery and a good read. Michael writes with verve, authority, and an eminently readable style. What a rare delight to discover all this, and in a technical book too! When the sequel comes along, sign me up." - Howard Katz , Owner, Fatdog Software Inc., Editor, XQuery from the Experts (Addison-Wesley, 2003) From corporate IT departments to academic institutions, XML has become the language of choice for storing and transmitting data across diverse application domains. XQuery, an XML Query Language invented by the World Wide Web Consortium, offers a powerful, standardized way to query all of that XML-encapsulated information. With its ability to integrate XML and non-XML data, XQuery seems poised to do for XML what SQL has done for relational data. Written by the Technical Lead for XML query processing at Microsoft, XQuery: The XML Query Language is an invaluable resource for XQuery novices and experts alike. For those new to XQuery, this example-rich text serves as a tutorial that brings readers quickly up to speed on XQuery's data model, type system, and core language features. More experienced XML and...
    Note: Includes bibliographical references (p. 473-477) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xliii, 681 p. , ill. (some col.) ; , 24 cm
    DDC: 005.2/762
    Keywords: C# (Computer program language) ; Computer software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Praise for Windows Forms Programming in C# "Chris may have a strong affinity for semi-colons, but anybody who's programming Windows Forms needs to read this book." - Brian Randell , Visual Basic Guru and DevelopMentor Instructor "Chris Sells has done it again. This book has everything a developer needs to know to write serious WinForms applications. Chris leaves no stone unturned in explaining the WinForms programming model and arming developers with the knowledge they need to exploit WinForms to the fullest. And, as if that weren't enough, Chris's writing style makes this book a page-turner for geeks. I couldn't put it down! Until John Grisham gets the .NET religion, you won't find a better WinForms book anywhere." - Jeff Prosise , co-founder of Wintellect, author of Programming Microsoft .NET "Chris is clearly *the* expert on web deployment of WinForms. In this book, Chris explains this material clearly and the power of the technology really shows. Unlike other WinForms books, this manuscript takes a more practical approach to the use of programming tools, such as Visual Studio. Sells's book strikes a nice balance between theory and practice. Windows Forms is an important technology that needs more press. Chris Sells' book is in great position to be the definitive work on the emerging technology." - Brian Graff , Sr. SW Engineer, PreEmptive Solutions, Inc. "Chris has written the best WinForms book around. Period." - Pierre Nallet , DevelopMentor Instructor "Chris does a nice job of presenting the core elements of WinForms complete with many concise samples and graphic depictions of UI features in action. Even more compelling, however, is how Chris anticipates how most developers will want to use these features, and presents techniques and paradigms of usage that will be invaluable for any serious WinForms developer. This book is destined to become dog-eared in the hands anyone building WinForms applications." - Fritz Onion , DevelopMentor instructor and author of Essential ASP.NET "I don't want just a description of the WinForms widgets. I can get that online or from other books. What I want is a roadmap for pitfalls to avoid, and innovative solutions for common problems. That is where this book shines." - Johan Ericcson , SW Engineer, Agilent "This is the definitive book for every Windows Programmer." - Fumiaki Yoshimatsu , Sr. Engineer, Intoferia Corporation "After browsing through countless books that introduce me to Windows Forms basics,...
    Note: Includes bibliographical references (p. 659-662) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "A refreshingly new approach toward improving use-case modeling by fortifying it with aspect orientation." - Ramnivas Laddad, author of AspectJ in Action "Since the 1980s, use cases have been a way to bring users into software design, but translating use cases into software has been an art, at best, because user goods often don't respect code boundaries. Now that aspect-oriented programming (AOP) can express crosscutting concerns directly in code, the man who developed use cases has proposed step-by-step methods for recognizing crosscutting concerns in use cases and writing the code in separate modules. If these methods are at all fruitful in your design and development practice, they will make a big difference in software quality for developers and users alike. - Wes Isberg, AspectJ team member "This book not only provides ideas and examples of what aspect-oriented software development is but how it can be utilized in a real development project." - MichaelWard, ThoughtWorks, Inc. "No system has ever been designed from scratch perfectly; every system is composed of features layered in top of features that accumulate over time. Conventional design techniques do not handle this well, and over time the integrity of most systems degrades as a result. For the first time, here is a set of techniques that facilitates composition of behavior that not only allows systems to be defined in terms of layered functionality but composition is at the very heart of the approach. This book is an important advance in modern methodology and is certain to influence the direction of software engineering in the next decade, just as Object-Oriented Software Engineering influenced the last." - Kurt Bittner, IBM Corporation "Use cases are an excellent means to capture system requirements and drive a user-centric view of system development and testing. This book offers a comprehensive guide on explicit use-case-driven development from early requirements modeling to design and implementation. It provides a simple yet rich set of guidelines to realize use-case models using aspect-oriented design and programming. It is a valuable resource to researchers and practitioners alike." - Dr. Awais Rashid, Lancaster University, U.K., and author of Aspect-Oriented Database Systems "AOSD is important technology that will help developers produce better systems. Unfortunately, it has not been obvious how to integrate AOSD across a project's lifecycle. This book shatters that ba...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Language: English
    Pages: xx, 721 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Computer software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: "If you are a serious user of UML, there is no other book quite like this one. I have been involved with the UML specification process for some time, but I still found myself learning things while reading through this book-especially on the changes and new capabilities that have come with UML." - Ed Seidewitz , Chief Architect, IntelliData Technologies Corporation The latest version of the Unified Modeling Language-UML 2.0-has increased its capabilities as the standard notation for modeling software-intensive systems. Like most standards documents, however, the official UML specification is difficult to read and navigate. In addition, UML 2.0 is far more complex than previous versions, making a thorough reference book more essential than ever. In this significantly updated and expanded edition of the definitive reference to the standard, James Rumbaugh, Ivar Jacobson, and Grady Booch-the UML's creators-clearly and completely describe UML concepts, including major revisions to sequence diagrams, activity models, state machines, components, internal structure of classes and components, and profiles. Whether you are capturing requirements, developing software architectures, designing implementations, or trying to understand existing systems, this is the book for you. Highlights include: Alphabetical dictionary of articles covering every UML concept Integrated summary of UML concepts by diagram type Two-color diagrams with extensive annotations in blue Thorough coverage of both semantics and notation, separated in each article for easy reference Further explanations of concepts whose meaning or purpose is obscure in the original specifications Discussion sections offering usage advice and additional insight into tricky concepts Notation summary, with references to individual articles A hyperlinked version of the book in Adobe Reader format on CD-ROM, an excellent resource for browsing or searching the text for specific information An enhanced online index available on the book's web site allowing readers to quickly and easily search the entire text for specific topics The result is an indispensable resource for anyone who needs to understand the inner workings of the industry standard modeling language.
    Note: Includes bibliographical references (p. 703-705) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 605 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Business ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Abstract: "This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them." --Eve Maler, XML Standards Architect, Sun Microsystems Businesses running legacy applications that do not support XML can face a tough choice: Either keep their legacy applications or switch to newer, XML-enhanced applications. XML presents both challenges and opportunities for organizations as they struggle with their data. Does this dilemma sound familiar? What if you could enable a legacy application to support XML? You can. In Using XML with Legacy Business Applications, e-commerce expert Michael C. Rawlins outlines usable techniques for solving day-to-day XML-related data exchange problems. Using an easy-to-understand cookbook approach, Rawlins shows you how to build XML support into legacy business applications using Java and C++. The techniques are illustrated by building converters for legacy formats. Converting CSV files, flat files, and X12 EDI to and from XML will never be easier! Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Language: English
    Pages: xxvii, 495 p. , ill. ; , 24 cm
    DDC: 005.1/17
    Keywords: Business enterprises ; Data processing ; Computer software ; Development ; Object-Oriented programming (Computer science) ; Software patterns ; UML (Computer science) ; Electronic books ; local
    Abstract: Praise for Enterprise Patterns and MDA &#8220I've never seen a system of business patterns as detailed as this one. The completeness that Arlow and Neustadt provide in these patterns is impressive. The explanations for why the patterns are formed the way they are and how they're interconnected are incredibly thorough. The patterns presented here have the potential to impact business applications in the same way the 'Gang of Four' patterns have impacted general software development." - Steve Vinoski Chief Engineer of Product Innovation IONA Technologies &#8220 Enterprise Patterns and MDA is a detailed, yet very readable, guide to designing business applications using reusable model components and Model Driven Architecture. It deserves a place on every application designer's desk." - Andrew Watson Vice President and Technical Director Object Management Group, Inc. &#8220Design patterns are generally acknowledged as an effective approach to developing robust and highly reusable software. Now that Model Driven Architecture is raising software design to ever-higher levels of abstraction, it is only natural that pattern concepts should find application in advanced modeling techniques. With this book, Arlow and Neustadt have greatly advanced the state of the art of MDA by defining both a theory and a methodology for applying the concept of Archetype Patterns to business software modeling." - John Poole Distinguished Software Engineer Hyperion Solutions Corporation "The burgeoning field of Model Driven Architecture tools and worldwide support for the Unified Modeling Language are finally being met with high-quality books that explain standard modeling techniques in a way any developer can follow. This book meets an urgent need squarely and clearly, and explains with copious examples a powerful approach to building usable (and reusable!) assets and applications. Every enterprise developer needs this book." - Richard Mark Soley, Ph.D. Chairman and CEO Object Management Group This book is a practical guide to applying Model Driven Architecture (MDA) and patterns in order to create business applications more easily. It provides you with a proven catalog of archetype patterns: high-value model components that can be easily incorporated into Unified Modeling Language (UML) models. Each archetype pattern allows you to understand and model a specific part of an enterprise system. Enterprise Patterns and MDA teaches you how to customize any archetype pattern-s...
    Note: Includes bibliographical references (p. 477-479) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Language: English
    Pages: 1 online resource (808 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication positions the IBM WebSphere Portal for Multiplatforms as the solution to best address the process of building scalable and reliable business-to-employee (B2E), business-to-business (B2B) and business-to-consumer (B2C) portals. The IBM WebSphere Portal for Multiplatforms V5 Handbook will help you to understand the WebSphere Portal architecture, how to install, tailor and configure WebSphere Portal, and how to administer and customize portal pages using WebSphere Portal. In this book, we discuss the installation of IBM WebSphere Portal for Multiplatforms within the Microsoft Windows 2000 Server, IBM AIX, SuSE SLE8 Linux, Solaris 8, and zLinux environments using Setup Manager. The ability to set up a clustered environment is covered, as well as a demonstration of migrating from WebSphere Portal V4.2 to V5.0. In this book, we illustrate the implementation and the use of the following directory services: IBM Directory Server, Lotus Domino Enterprise Server, and Sun ONE Directory Server. In the IBM WebSphere Portal for Multiplatforms V5 Handbook, you will find step-by-step examples and scenarios showing ways to rapidly integrate your enterprise applications into an IBM WebSphere Portal environment using state-of-the-art technologies such as portlets. You will be able to implement new and enhanced capabilities incorporated in current releases of IBM WebSphere Portal offerings, which provide powerful collaboration applications such as Lotus QuickPlace, Lotus Sametime, and Lotus Collaborative components.
    Note: Online resource; Title from title page (viewed March 18, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Language: English
    Pages: 1 online resource (614 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication describes the technical details of WebSphere Business Integration Server Foundation and discusses using WebSphere Studio Application Developer Integration Edition for application development. It provides valuable information for system administrators, developers and architects about the products covered. This book specifically focuses on WebSphere Process Choreographer and on solutions implementing it. Part 1, "Architecting a WebSphere Enterprise solution" includes high-level details about WebSphere solutions using WebSphere Business Integration Server Foundation. Part 2, "Setting up the environment" provides step-by-step details about installing the runtime and development environments. Part 3, "Implementing WebSphere Enterprise solutions" provides details about the J2EE Programming Model Extensions and functions in WebSphere Business Integration Server Foundation. You can learn how to design, develop, assemble, deploy and administer applications in the WebSphere Business Integration Server Foundation environment. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed November 12, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750676069
    Language: English
    Pages: 1 online resource (365 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Firmware Handbook provides a comprehensive reference for firmware developers looking to increase their skills and productivity. It addresses each critical step of the development process in detail, including how to optimize hardware design for better firmware. Topics covered include real-time issues, interrupts and ISRs, memory management (including Flash memory), handling both digital and analog peripherals, communications interfacing, math subroutines, error handling, design tools, and troubleshooting and debugging. This book is not for the beginner, but rather is an in-depth, comprehensive one-volume reference that addresses all the major issues in firmware design and development, including the pertinent hardware issues. Included CD-Rom contains all the source code used in the design examples, so engineers can easily use it in their own designs
    Note: Online resource; Title from title page (viewed April 16, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (728 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Introduction to Optimum Design is intended for use in a first course on engineering design and optimization. Virtually any problem for which specific parameters need to be determined to satisfy constraints can be formulated as a design optimization problem. The concepts and methods described in the text are quite general and applicable to all such formulations. Inasmuch, the range of application of the optimum design methodology is almost limitless, constrained only by the imagination and ingenuity of the user.
    Note: Online resource; Title from title page (viewed May 5, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (480 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Although there are several books in print dealing with elasticity, many focus on specialized topics such as mathematical foundations, anisotropic materials, two-dimensional problems, thermoelasticity, non-linear theory, etc. As such they are not appropriate candidates for a general textbook. This book provides a concise and organized presentation and development of general theory of elasticity. Complemented by a Solutions Manual and including MatLab codes and coding, this text is an excellent book teaching guide.
    Note: Online resource; Title from title page (viewed August 20, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: 1 online resource (980 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication provides IT architects, IT specialists, and administrators with the critical knowledge to design, develop, implement, deploy, and manage a WebSphere Commerce V5.5 hosting site with multiple stores. This book includes: - An introduction to the WebSphere Commerce hosting model and the hosting composite pattern - An ITSO hosting example, including a business requirements analysis and solution design. - How to implement a team development environment, customize a store profile, and build, deploy, and manage multiple stores. - How to manage a hosting hub, hub organization, and hosted stores. - How to manage a hosted B2B store and organizations. - How to manage a hosted B2C store and organizations. The appendixes include procedures and tips for WebSphere Commerce implementation, WebSphere Commerce Studio implementation, common procedures, and error handling scenarios. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed May 19, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (748 pages)
    Keywords: Electronic books ; local
    Abstract: DFSMSrmm is the IBM tape management system for OS/390 and z/OS platforms. As part of DFSMS, DFSMSrmm is completely integrated into the IBM storage management strategy. This allows easier installation and maintenance, as well as standard interfaces with other systems components, such as DFSMSdfp and DFSMShsm. DFSMSrmm provides a simple and flexible tape management environment, with support for all tape technologies, including IBM automated tape libraries, manual tapes, and other tape libraries. This IBM Redbooks publication is written for people who are planning to convert from TLMS to DFSMSrmm. We have designed this book to help you with all aspects of the conversion, from the early planning stage through implementation and customization of DFSMSrmm into your production system. We provide details on the differences between DFSMSrmm and TLMS and compare the terminology, data, and functions. We explain how to use the IBM-supplied sample conversion programs and get the converted data validated and ready for use in a production environment. Working samples that are ready for use are included.
    Note: Online resource; Title from title page (viewed February 10, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1000 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003. * Everything a System Administrator will ever need to know about running a Windows Server 2003 network. * This is the book that meets the needs of today's Windows Server 2003 professional. * Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations.
    Note: Online resource; Title from title page (viewed June 18, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (282 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication covers the process of converting a PSSP cluster to a CSM cluster. It examines the different tools, utilities, documentation and other resources available to help the system administrator move a system from PSSP to CSM. It also examines the different paths a customer can take to achieve this transition and illustrates these different paths with step-by-step transition scenarios of actual clustered systems. This book also makes recommendations about which procedures are most suitable for different types of customer environments (high performance technical computing, server consolidation, business intelligence, etc.) and points out the relative advantages and disadvantages of the different procedures, tools, and methods. Customers will use the working knowledge presented in this book to plan and accomplish the transition of their own clustered systems from PSSP to CSM. Are you using GPFS? This transition book covers a number of GPFS transition methods, each with its own recommendations, GPFS cluster types, advantages versus disadvantages, and step-by-step scenarios. It also shows a method of moving GPFS storage between two clusters, which could be used during hardware transition or upgrades.
    Note: Online resource; Title from title page (viewed August 16, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: 1 online resource (644 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
    Note: Online resource; Title from title page (viewed April 2, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    ISBN: 0738498246
    Language: English
    Pages: 1 online resource (606 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication explores the different coexistence scenarios for the WebSphere and .NET platforms. This book is a good source of information for solution designers and developers, application integrators and developers who wish to integrate solutions on the WebSphere and .NET platforms. Part 1, "Introduction" is a quick introduction to the J2EE (WebSphere) and .NET technologies. It also depicts a basic architectural model that can be used to represent both WebSphere applications and .NET applications. Part 2, "Scenarios" identifies several potential technical scenarios for coexistence via point-to-point integration between applications deployed in the IBM WebSphere Application Server and applications deployed in the Microsoft .NET Framework. This part provides in-depth technical details on how to implement certain scenarios using today's existing technologies. Part 3, "Guidelines" provides general guidelines for solution developers. A list of supporting technologies can help with the solution implementation. The Quality of Service chapter is a collection of services available on both platforms. The Appendixes go further by using other IBM technologies and describing two integration solutions between Lotus Domino and .NET applications. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed March 28, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321270789
    Language: English
    Pages: 1 online resource (488 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Photoshop Elements 3, Adobe's more accessible version of its flagship product, Photoshop, opens the door for amateur photographers, business users, students, and home users who want professional-looking images for their print and Web projects. Photoshop Elements 3 for Windows and Macintosh: Visual QuickStart Guide uses task-based lessons to show readers how to capture photos from traditional or digital cameras, reduce red eye, correct color, work with layers, erase backgrounds, create photo-illustrations and Web graphics, simulate painting and drawing techniques, apply artistic effects, and more. Longtime graphic designer and digital imaging expert Craig Hoeschen provides concise, step-by-step instructions and plenty of screenshots to help users look up just what they need to know, while an eight-page color gallery shows off sample filters, effects, and plenty of retouching and compositing examples for additional inspiration.
    Note: Online resource; Title from title page (viewed December 21, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Language: English
    Pages: 1 online resource (1008 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Design, install, and manage a complete unified communications solution with this definitive guide. Gain an in-depth understanding of the Cisco Unity architecture and feature set Plan, design, and install a complete unified messaging solution using the design process found within this guide Use features in Cisco Unity to solve legacy and convergence problems for your users Administer and manage Unity installations effectively by leveraging the comprehensive solutions provided in this book Learn about Microsoft Exchange and Lotus Domino support and configuration with Cisco Unity Support CallManager and legacy PBX integrations with your unified messaging solutions This definitive reference helps you leverage the true power of Cisco Unity, the powerful unified communications server that provides advanced, convergence-based communication services, which integrate with the desktop applications that business professionals use everyday. Cisco Unity Deployment and Solutions Guide shows you how to integrate Cisco Unity with Cisco IP-based communication solutions, including Cisco CallManager. Part I introduces you to the Cisco Unity architecture and teaches you about the Cisco Unity feature set. Part II helps you design and deploy a unified message solution with Cisco Unity, and Part III helps you manage and administer your solution by leveraging the tools within Cisco Unity. Cisco Unity Deployment and Solutions Guide teaches you all that you need to know about designing, deploying, and managing a sustainable, unified messaging solution. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Online resource; Title from title page (viewed August 3, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Boston : Addison-Wesley | [Erscheinungsort nicht ermittelbar] : HathiTrust Digital Library
    ISBN: 0321174046
    Language: English
    Pages: 1 online resource (xl, 1379 pages) , illustrations.
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    Keywords: Microsoft .NET Framework ; Visual Basic ; Visual Basic (Computer program language) ; BASIC (Computer program language) ; Microsoft Visual BASIC (Logiciel) ; Microsoft .NET Framework ; BASIC (Langage de programmation) ; Microsoft .NET Framework ; Visual Basic (Langage de programmation) ; BASIC (Computer program language) ; Visual Basic (Computer program language)
    Abstract: "For nearly two decades, Paul Yao and David Durant have been acknowledged as experts on the Windows platform, so it's only natural that they would bring their experienced point of view to the .NET Compact Framework. With a unique combination of historical perspective and in-depth understanding of the subject matter, Yao and Durant take the reader through not only the technical guts of the Compact Framework but also the reasons behind the design decisions." --Joshua Trupin, Executive Editor, MSDN Magazine "Yao and Durant have written a book that, although it assumes no prior experience with the .NET Framework, serves both the rookie and advanced programmer equally well. This is definitely a rare quality among technical books and is certainly not an easy thing for an author to accomplish." --Doug Holland, Precision Objects "This is a very good hands-on book with plenty of sample code illustrating programming tasks and techniques, which any serious development effort for Windows CE or Pocket PC will require." --Bill Draper, Director of Software Development "This book serves as both a great reference and tutorial when building .NET Compact Framework applications. My only wish is that it had been available sooner." --Greg Hack, Senior Software Engineer, Allscripts Healthcare Solutions "Of the handful of books on Compact Framework, this book takes the cake. Paul Yao and David Durant's expertise with .NET Compact Framework is evident from their excellent and very insightful coverage of sections such as Building the User Interface, Managing Device Data, and Creating Graphical Output. The chapter discussing the topic of P/Invoke is unparalleled. After reviewing this book, I am certain that if there is one book that will help you understand .NET Compact Framework, this is the one." --Deepak Sharma, Senior Systems Specialist, Tata Infotech Ltd. "Yao and Durant's fresh, innovative, and in-depth look at the .NET Compact Framework gets developers up to speed using C# to develop robust and scaleable handheld software solutions. A definite must-read for mobile handheld developer enthusiasts!" --Andrew Krowczyk, Software Architect, Zurich North America is the definitive tutorial and reference for the .NET Compact Framework (CF). It shows you how to transfer your skills and your code to the Pocket PC 2003 and other mobile and embedded smart devices. .NET Compact Framework Programming with Visual Basic .NET Authors Paul Yao and David Durant draw upon their years of research and experience with members of the Microsoft .NET CF team to show you exactly how the best CF programming gets done in Visual Basic .NET. This is the only book a programmer needs to master the art of CF coding. Throughout the book, sample code and examples illustrate best practices and programming techniques. In addition, the companion Web site includes downloadable code for all these examples, along with a set of development tools to help you with your CF development projects. The authors expertly zero in on what programmers need to understand for successful smart device programming, including: Garbage Collection in the .NET Compact Framework Controls and supported Properties, Methods, and Events (PMEs) Custom controls with Windows Forms Designer support Using Platform Invoke (P/Invoke) Simple and complex data binding and the DataGrid control Programming with ADO.NET data classes Synchronizing SQL Server CE with SQL Server 2000 databases Creating graphical output, including font and printing coding tricks Differences between the standard desktop framework and the CF is your single resource for everything you really need to know about CF programming. .NET Compact Framework Programming with Visual Basic .NET.
    Note: Includes index. - Print version record , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Mac OS ; Cocoa (Application development environment) ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0321503619 ISBN-13: 9780321503619 The highly acclaimed introduction to Cocoa-recommended most by experienced Mac OS X developers now updated and expanded. Here's what critics said about the first edition: "Reading this book is the absolute best way to learn how to harness the power of this amazing technology." - Andrew Stone, President, Stone Design, www.stone.com "Make sure this is the first one you pick up. It's the best book for a beginning Cocoa programmer." -From the review on HyperJeff.net & "I love this book. The descriptions are clear, the examples logical. Everything a programmer needs to get up to speed on Cocoa." - Dave Mark, Editor, MacTech Magazine To help programmers develop applications for Mac OS X, Apple is now giving away XCode, Interface Builder, and the Cocoa frameworks-the tools used to create Safari, GarageBand, Mail, and the iApps. Cocoa® Programming for Mac® OS X, Second Edition, will give you a complete understanding of how to use these tremendously powerful tools and frameworks to write full-featured applications for the Mac. Guiding programmers through the key features of Cocoa, this book emphasizes design patterns that enable you to predict the behavior of classes you have never used before. Written in a tutorial format, it takes you step-by-step through the creation of six applications and an Interface Builder palette. Each project introduces several new ideas, and as each concept or technique is discussed, the author, drawing on his own extensive experience, shows you the right way to use it. Updated for Xcode and Mac OS X 10.3, new chapters in this second edition include coverage of OpenGL, AppleScriptability, the undo manager, creating frameworks, and a brief introduction to using GNUstep on Linux.
    Note: Includes bibliographical references (p. 427-428) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: xxvii, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed. /
    DDC: 686.2/2544536
    Keywords: LaTeX (Computer file) ; Computerized typesetting ; Electronic books ; local
    Abstract: This is the digial version of the printed book (Copyright © 2004). The LaTeX Companion has long been the essential resource for anyone using LaTeX to create high-quality printed documents. This completely updated edition brings you all the latest information about LaTeX and the vast range of add-on packages now available--over 200 are covered! Full of new tips and tricks for using LaTeX in both traditional and modern typesetting, this book will also show you how to customize layout features to your own needs--from phrases and paragraphs to headings, lists, and pages. Inside, you will find: Expert advice on using LaTeX's basic formatting tools to create all types of publications--from memos to encyclopedias In-depth coverage of important extension packages for tabular and technical typesetting, floats and captions, multicolumn layouts--including reference guides and discussions of the underlying typographic and TeXnical concepts Detailed techniques for generating and typesetting contents lists, bibliographies, indexes, etc. Tips and tricks for LaTeX programmers and systems support New to this edition: Nearly 1,000 fully tested examples that illustrate the text and solve typographical and technical problems--all ready to run! An additional chapter on citations and bibliographies Expanded material on the setup and use of fonts to access a huge collection of glyphs, and to typeset text from a wide range of languages and cultures Major new packages for graphics, "verbatim" listings, floats, and page layout Full coverage of the latest packages for all types ofdocuments--mathematical, multilingual, and many more Detailed help on all error messages, including those troublesome low-level TeX errors Like its predecessor, The LaTeX Companion, Second Edition, is an indispensable reference for anyone wishing to use LaTeX productively. The accompanying CD-ROM contains a complete plug-and-play LaTeX installation, including all the packages and examples featured in the book.
    Note: Goossens's name appears first on the earlier edition. - Includes bibliographical references (p. [963]-982) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Language: English
    Pages: xxxv, 612 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: FireWall-1 ; Computer networks ; Security measures ; Computer programs ; Computer security ; Computer programs ; Electronic books ; local
    Abstract: "When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from your own mistakes--let PhoneBoy show you the right way to manage your FireWall-1 NG infrastructure." --Tina Bird, Computer Security Officer, Stanford University "Dameon has taken his original definitive guide and updated it thoroughly for NG. No other book is informed by his depth of experience with Check Point. Accept no substitutes!" --Matthew Gast, author of 802.11 Wireless Networks: The Definitive Guide "PhoneBoy is the de facto expert on this product, and people have been clamoring for an NG book from him since he published the first one. No one can compete with him." --Valerie M. Leveille, Professional Educator "Dameon is the foremost authority on FireWall-1. He has the knowledge to give details of FireWall-1 functionality that no other reference on this topic can." --Paul Keser, Senior Network Security Engineer, Raytheon ITSS/NASA Ames Research Center "This book is the Swiss army knife solution for Check Point FireWall-1 NG." --Thomas Warfield, TNT-OK.com Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1 ® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and detailed sample configurations you can use right now to improve reliability, efficiency, and manageability in your Check Point environment. The author's previous Check Point FireWall-1 guide became an instant bestseller, earning the praise of security professionals worldwide. This new book has been thoroughly revamped to reflect Check Point FireWall-1 NG's powerful new features, and it includes even more expert solutions from PhoneBoy's FireWall-1 FAQ, the Web's #1 independent Check Point support site. Whether you're a security/network architect, administrator, or manager, you'll find it indispensable. Whether you're running FireWall-1 NG on UNIX or Windows platforms, this book brings together expert guidance for virtually every challenge you'll face: building your rulebase, logging and alerting, remote management, user authentication, inbound/outbound content restriction, managing NAT environments, buildi...
    Note: Includes bibliographical references (p. 587-588) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/762
    Keywords: Internet programming ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: " J2EE™ Web Services is written in the tradition of great books people have come to expect from author Richard Monson-Haefel. More than a complete and concise Web services reference, this essential guide is the way for J2EE developers to quickly master Web services architecture and development." - Floyd Marinescu Author, EJB Design Patterns Director, TheServerSide.com "Written in a straightforward and approachable style, Monson-Haefel's latest book is a mustread for any Java developer who is serious about understanding and applying the J2EE APIs in support of Web services. By concentrating on the core technologies endorsed by the WS-I, it clearly explains why Web services will succeed in realizing the interoperability promise where previous attempts have failed." - James McCabe Software IT Architect IBM "This is the best-and most complete-description of J2EE Web services that I've seen. If you're a Java developer, you need this book." - David Chappell Chappell & Associates "For Java Web service developers, this book is going to be there on their desk next to their PC for easy reference. The book has it all, clear guides as to what WSDL, SAAJ, UDDI are, and how they are used in a variety of examples. Monson-Haefel has created another classic with this volume." - Dr. Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland "Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I've seen so far to date. This book covers the core Web services technologies (XML, SOAP, WSDL, and UDDI), as well as the Java APIs for Web services (JAX-RPC, SAAJ, JAXR, JAXP, and Web Services for J2EE, version 1.1). Richard also goes into detail on issues such as fault handling, type mapping, and JAX-RPC handlers. Developers will find this book to be a very valuable reference." - Anne Thomas Manes Research Director, Burton Group Author, Web Services: A Manager's Guide " J2EE™ Web Services is an excellent reference and tutorial for both beginning and seasoned Web services architects and developers. This book is the first to fully cover the WS-I 1.0 Web services standards and their integration with J2EE 1.4 components. Spend time with this book, and you'll soon master J2EE Web Services and be able to successfully use this technology to solve key business integration problems in your enterprise." - Tom Marrs Senior J2EE/XML/Web Services Architect Distributed Computing Solutions, Inc. Web services are revolutionizing ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780125571890
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have been under-utilized. At the opposite extreme, you will learn where they tend to fail to contribute to the twin goals of network efficiency and cost-savings. Most of all, you will learn precisely how to tailor theoretical models to make them as useful as possible in practice. Throughout, the authors focus on the traffic demands encountered in the real world of network design. Their generic approach, however, allows problem formulations and solutions to be applied across the board to virtually any type of backbone communication or computer network. For beginners, this book is an excellent introduction. For seasoned professionals, it provides immediate solutions and a strong foundation for further advances in the use of mathematical modeling for network design. Written by leading researchers with a combined 40 years of industrial and academic network design experience. Considers the development of design models for different technologies, including TCP/IP, IDN, MPLS, ATM, SONET/SDH, and WDM. Discusses recent topics such as shortest path routing and fair bandwidth assignment in IP/MPLS networks. Addresses proper multi-layer modeling across network layers using different technologies—for example, IP over ATM over SONET, IP over WDM, and IDN over SONET. Covers restoration-oriented design methods that allow recovery from failures of large-capacity transport links and transit nodes. Presents, at the end of each chapter, exercises useful to both students and practitioners.
    Note: Online resource; Title from title page (viewed July 21, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlv, 1507 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.2/762
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: The J2EE™ Tutorial, Second Edition , is the complete guide to all major components of the Java 2 Platform, Enterprise Edition (J2EE) version 1.4. Written by members of the J2EE platform team at Sun Microsystems, this is the task-oriented and example-driven book that will have new and intermediate Java programmers building J2EE applications right away. The first chapters introduce the J2EE 1.4 platform architecture and APIs, the Sun Java System Application Server Platform Edition 8, and the basics of working with XML and Web applications. The greater part of the book is devoted to describing and demonstrating the Java XML, Web-tier, and Enterprise JavaBeans technologies and platform services. Extensive examples and case studies show you how to put these technologies to work in the real world. The technologies and services detailed include: Java API for XML Processing (JAXP) Java API for XML-Based RPC (JAX-RPC) SOAP with Attachments API for Java (SAAJ) Java API for XML Registries (JAXR) Java Servlet JavaServer Pages (JSP) JSP Standard Tag Library (JSTL) JavaServer Faces Internationalization and localization Enterprise JavaBeans (EJB) Transactions Resource connections Security Java Message Service API (JMS API) The J2EE™ Tutorial, Second Edition, will give you a head start in developing and deploying J2EE applications. The accompanying CD-ROM includes the tutorial examples (binary and source code) and the J2EE Software Development Kit, Enterprise Edition 1.4 (J2EE 1.4 SDK), which contains the Sun Java System Application Server Platform Edition 8, Java 2 Software Development Kit (J2SE SDK), and BluePrints sample applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlix, 694 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.1/17
    Keywords: Embedded computer systems ; Programming ; Object-oriented methods (Computer science) ; Real-time data processing ; Electronic books ; local
    Abstract: Praise for Real Time UML, Third Edition "I found Real Time UML, Third Edition, to provide an informative and practical application of UML 2.0 to the development of real-time systems, and well worth the read by systems and software engineers. It is written in plain English and provides the right balance of depth and breadth." - Sanford Friedenthal, Deputy, Corporate Systems Engineering, Lockheed Martin Corporation; Chair: OMG Systems Engineering, Domain Special Interest Group "Douglass has again made highly technical material accessible to everyone. This book is an excellent introduction to the new UML 2.0, and if you want to learn what modeling for real-time environments is like, this is the book to read. His witty, conversational style should be a model for all authors of technical material." - Gary K. Evans, Founder and Object Evangelist, Evanetics, Inc. (www.evanetics.com) "Douglass has been a co-chair of the OMG's group interested in quality of service issues and, therefore, has valuable insights into the usefulness of these emerging technologies. His clear presentation of this information helps those applying these advanced technologies to extract the most benefit for their organizations and products, not only for the intended real-time embedded product, but also for products whose quality of performance, while not critical, is nevertheless of interest." - Thérèse M. Smith, President and CEO, Air Traffic Software Architecture, Inc. (USA and Canada) "The author presents an excellent overview of UML in the real-time space with plenty of colorful examples. This book is an excellent teaching tool for a newcomer or a reference for an expert!" - Soma Chatterjee, Senior Product Manager, I-Logix The increasing complexity of embedded and real-time systems requires a more premeditated and sophisticated design approach for successful implementation. The object-based Unified Modeling Language (UML) can describe the structural and behavioral aspects critical to real-time systems and has come to the fore as an outstanding medium for effective design. Like its best-selling predecessors, Real Time UML, Third Edition, provides an overview of the essentials of real-time systems and an introduction to UML that focuses on the use of the ever-evolving standard in design and development. This accessible book examines requirements analysis, the definition of object structure and behavior, architectural and mechanistic design, and more detailed designs that enco...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; Computer software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Praise Page for Windows Forms Programming in Visual Basic .NET "This is the .NET WinForms book to have. If you have been looking for a good Windows Forms book for your bookshelf, here it is. Windows Forms Programming in Visual Basic .NET covers everything from 'Hello World' to multithreading the user interface. Sells and Gehtland definitely understand Windows Forms and VB and are able to bring many new .NET techniques and concepts to the VB masses." - Darrin Bishop , Senior Technical Specialist "Not only does Sells do a great job of breaking down all the quintessential components that anyone developing a Windows Forms application should know, but he also covers the critical pieces of functionality, like multi-threaded programming and resource management, which every Windows Forms developer should incorporate into his or her applications." - Colin Bowern , Senior Consultant, Microsoft Corporation "With its excellent content, this book is easily an important component for any Visual Basic .NET developer's toolbox." - Amit Kalani , coauthor of MCAD/MCSD Developing and Implementing Windows®-based Applications with Microsoft Visual C#™ .NET and Microsoft Visual Studio®.NET Exam Cram 2 (Exam Cram 70-316) "If you are a VB.NET developer-or one coming from a 'classic' VB background-and you want a no-nonsense guide to the key elements of WinForms development, this book is for you. In-depth practical experience shines through each chapter." - Martin Naughton , Independent Freelance Software Consultant "If you're planning on using the .NET Framework, this book is an invaluable resource. Chris dives straight into the heart of what makes the Windows Forms Framework tick. He has a real talent for striking the proper balance between showing you the theory behind the software and demonstrating coding techniques that will make you instantly productive." -From the Foreword by Ted Pattison , VB .NET Guru and author of Building Applications and Components with Visual Basic .NET "This book contains consistent and detailed hands-on examples about Windows Forms. Whether you are new to programming in .NET or already experienced, Chris Sells gives you the thorough grounding you need to write Windows Forms applications." - Erick Sgarbi , Software Engineer "This is a great book for programmers who need to get work done with WinForms, and don't have time to read a 1,200-page tome. Unlike many of the other WinForms books out there, it goes beyond the available Microsof...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780714655284
    Language: English
    Pages: 1 online resource (584 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: SOE in France was first published in 1966, followed by a second impression with amendments in 1968. Since these editions were published, other material on SOE has become available. It was, therefore, agreed in 2000 that Professor Foot should produce a revised version. In so doing, in addition to the material in the first edition, the author has had
    Note: Online resource; Title from title page (viewed April 22, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order t
    Note: Online resource; Title from title page (viewed September 29, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 347 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    Keywords: JavaServer pages ; Web sites ; Design ; Electronic books ; local
    Abstract: Since being introduced in 1999, JavaServer Pages™ (JSP) have become a popular and important technology for building dynamic, interactive, content-rich Web sites. JavaServer Pages™, Second Edition is a hands-on guide to working with JSP, offering the easiest and most efficient ways for non-programmers and Web designers to create sophisticated, dynamic sites. Programmers can also utilize this book to independently create new dynamic components. This second edition covers the latest release of the JSP specification (2.0), many standard extensions to JSPs, and a number of best practices that have been developed since the publication of the first edition. This book also offers overviews of some related technologies, including: JavaBeans™ Servlets JavaServer Pages Standard Tag Library (JSTL) Jakarta Struts Databases JavaServer Pages™, Second Edition contains all the information necessary to start writing JSP--for anyone who has a computer and can write HTML. It includes practical, Java-based techniques for maintaining and personalizing information-rich Web sites, as well as examples based on Jakarta Struts, the new JSP toolkit. Recent updates provide a number of new tools and techniques that will allow readers to get the most productivity from JSPs, with the least amount of effort. Also included is a CD-ROM containing everything you need to get started. The tools, which are free, open-source, stable, secure, and run on pretty much every platform, are powerful enough to serve even a mid-sized Web site without problems. Contents of the CD-ROM include: Tomcat™, the open-source reference implementation of the latest JSP and Servlet specification; useful libraries such as the JavaServer Pages Standard Tag Library (JSTL) and Struts; Hsqldb, a self-contained, 100 percent pure Java database; all the code examples from the book; and a number of Java beans, providing ready-to-use components for many of the tasks frequently needed on a dynamic Web page. 0321150791B06042003
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750677837
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The way electronic instruments are built is changing in a deeply fundamental way. It is making an evolutionary leap to a new method of design that is being called synthetic instruments. This new method promises to be the most significant advance in electronic test and instrumentation since the introduction of automated test equipment (ATE). The switch to synthetic instruments is beginning now, and it will profoundly affect all test and measurement equipment that will be developed in the future. Synthetic instruments are like ordinary instruments in that they are specific to a particular measurement or test. They might be a voltmeter that measures voltage, or a spectrum analyzer that measures spectra. The key, defining difference is this: synthetic instruments are implemented purely in software that runs on general purpose, non-specific measurement hardware with a high speed A/D and D/A at its core. In a synthetic instrument, the software is specific; the hardware is generic. Therefore, the "personality" of a synthetic instrument can be changed in an instant. A voltmeter may be a spectrum analyzer a few seconds later, and then become a power meter, or network analyzer, or oscilloscope. Totally different instruments are implemented on the same hardware and can be switched back and forth in the blink of an eye. This book explains the basics of synthetic instrumentation for the many people that will need to quickly learn about this revolutionary way to design test equipment. This book attempts to demystify the topic, cutting through, commercial hype, and obscure, vague jargon, to get to the heart of the technique. It reveals the important basic underlying concepts, showing people how the synthetic instrument design approach, properly executed, is so effective in creating nstrumentation that out performs traditional approaches to T&M and ATE being used today. provides an overview and complete introduction to this revolutionary new technology enables equipment designers and manufacturers to produce vastly more functional and flexible instrumentation; it's not your father's multimeter!
    Note: Online resource; Title from title page (viewed September 9, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780700714018
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Examining the cultural, political, economic, technological and institutional aspects of popular music throughout Asia, this book is the first comprehensive analysis of Asian popular music and its cultural industries. Concentrating on the development of popular culture in its local socio-political context, the volume highlights how local appropriations of the pop music genre play an active rather than reactive role in manipulating global cultural and capital flows. Broad in geographical sweep and rich in contemporary examples, this work will appeal to those interested in Asian popular culture from a variety of perspectives including, political economy, anthropology, communication studies, media studies and ethnomusicology.
    Note: Online resource; Title from title page (viewed July 31, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750662727
    Language: English
    Pages: 1 online resource (461 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: New technologies are revolutionising the way manufacturing and supply chain management are implemented. These changes are delivering manufacturing firms the competitive advantage of a highly flexible and responsive supply chain and manufacturing system to ensure that they meet the high expectations of their customers, who, in today's economy, demand absolutely the best service, price, delivery time and product quality. To make e-manufacturing and supply chain technologies effective, integration is needed between various, often disparate systems. To understand why this is such an issue, one needs to understand what the different systems or system components do, their objectives, their specific focus areas and how they interact with other systems. It is also required to understand how these systems evolved to their current state, as the concepts used during the early development of systems and technology tend to remain in place throughout the life-cycle of the systems/technology. This book explores various standards, concepts and techniques used over the years to model systems and hierarchies in order to understand where they fit into the organization and supply chain. It looks at the specific system components and the ways in which they can be designed and graphically depicted for easy understanding by both information technology (IT) and non-IT personnel. Without a good implementation philosophy, very few systems add any real benefit to an organization, and for this reason the ways in which systems are implemented and installation projects managed are also explored and recommendations are made as to possible methods that have proven successful in the past. The human factor and how that impacts on system success are also addressed, as is the motivation for system investment and subsequent benefit measurement processes. Finally, the vendor/user supply/demand within the e-manufacturing domain is explored and a method is put forward that enables the reduction of vendor bias during the vendor selection process. The objective of this book is to provide the reader with a good understanding regarding the four critical factors (business/physical processes, systems supporting the processes, company personnel and company/personal performance measures) that influence the success of any e-manufacturing implementation, and the synchronization required between these factors. · Discover how to implement the flexible and responsive supply chain and manufacturi...
    Note: Online resource; Title from title page (viewed August 11, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780127323503
    Language: English
    Pages: 1 online resource (278 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: While many architects use PHP for projects, they are often not aware of the power of PHP in creating enterprise-level applications. This book covers the latest version of PHP – version 5 -- and focuses on its capabilities within a multi-tier application framework. It contains numerous coding samples and commentaries on them. A chapter discusses object orientation in PHP as it applies to the multi-tier architecture and other chapters discuss HTTP and SOAP, the two communication protocols most useful in tying together multiple layers. There is also coverage of database design and query construction as well as information about tricks you can use in generating user interfaces. Covers PHP as it relates to developing software in a multi-tier environment—a crucial aspect of developing robust software with low cost and ease of use as design goals. Makes extensive use of Simple Object Access Protocol (SOAP) and Web Services as implemented in PHP and NuSOAP. Shows precisely how to make use of the InnoDB table type newly available in MySQL. InnoDB supports true referential integrity and row-level locking. An application example (a multi-currency bookkeeping application) runs throughout the book, showing various PHP capabilities as well as the database interaction.
    Note: Online resource; Title from title page (viewed June 25, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9781558608283
    Language: English
    Pages: 1 online resource (1052 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Fully updated, revised, and expanded, this second edition of Modern Cable Television Technology addresses the significant changes undergone by cable since 1999--including, most notably, its continued transformation from a system for delivery of television to a scalable-bandwidth platform for a broad range of communication services. It provides in-depth coverage of high speed data transmission, home networking, IP-based voice, optical dense wavelength division multiplexing, new video compression techniques, integrated voice/video/data transport, and much more. Intended as a day-to-day reference for cable engineers, this book illuminates all the technologies involved in building and maintaining a cable system. But it's also a great study guide for candidates for SCTE certification, and its careful explanations will benefit any technician whose work involves connecting to a cable system or building products that consume cable services. Written by four of the most highly-esteemed cable engineers in the industry with a wealth of experience in cable, consumer electronics, and telecommunications All new material on digital technologies, new practices for delivering high speed data, home networking, IP-based voice technology, optical dense wavelength division multiplexing (DWDM), new video compression techniques, and integrated voice/video/data transport Covers the latest on emerging digital standards for voice, data, video, and multimedia Presents distribution systems, from drops through fiber optics, an covers everything from basic principles to network architectures
    Note: Online resource; Title from title page (viewed January 13, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780415259507
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This innovative study of language and identity in recent and contemporary cases of ethnic conflict in Europe and Eurasia sets out a response to the limitations in the fields of linguistics and political science. Using examples of language policy and planning in conflict situations, it examines the functions of language as a marker of identity in ethnic conflict, and the extent to which language may be a causal factor in ethnic conflict.
    Note: Online resource; Title from title page (viewed March 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781932266825
    Language: English
    Pages: 1 online resource (550 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal. Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance. Provides insider information on how to optimize performance of Ethereal on enterprise networks. Book comes with a CD containing Ethereal, Tethereal, Nessus, Snort, ACID, Barnyard, and more! Includes coverage of popular command-line version, Tethereal.
    Note: Online resource; Title from title page (viewed February 23, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781931836197
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market. * This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations. * Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities. * Learn how to take advantage of ISA Server 2004's new VPN capabilities!
    Note: Online resource; Title from title page (viewed December 31, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 0321617738 , 9780321617736
    Language: English
    Pages: xii, 597 p , ill. , 24 cm. +
    Edition: 4th ed.
    Series Statement: Addison-Wesley series on tools and techniques for computer typesetting
    Parallel Title: Erscheint auch als
    Keywords: LaTeX (Computer file) ; Computerized typesetting ; Electronic books ; local
    Abstract: Published Nov 25, 2003 by Addison-Wesley Professional. Part of the Tools and Techniques for Computer Typesetting series. The series editor may be contacted at frank.mittelbachlatex-project.org. LaTeX is the text-preparation system of choice for scientists and academics, and is especially useful for typesetting technical materials. This popular book shows you how to begin using LaTeX to create high-quality documents. The book also serves as a handy reference for all LaTeX users. In this completely revised edition, the authors cover the LaTeX2ε standard and offer more details, examples, exercises, tips, and tricks. They go beyond the core installation to describe the key contributed packages that have become essential to LaTeX processing. Inside, you will find: Complete coverage of LaTeX fundamentals, including how to input text, symbols, and mathematics; how to produce lists and tables; how to include graphics and color; and how to organize and customize documents Discussion of more advanced concepts such as bibliographical databases and BIBTeX, math extensions with AMS-LaTeX, drawing, slides, and letters Helpful appendices on installation, error messages, creating packages, using LaTeX with HTML and XML, and fonts An extensive alphabetized listing of commands and their uses New to this edition: More emphasis on LaTeX as a markup language that separates content and form--consistent with the essence of XML Detailed discussions of contributed packages alongside relevant standard topics In-depth information on PDF output, including extensive coverage of how to use the hyperref package to create links, bookmarks, and active buttons As did the three best-selling editions that preceded it, Guide to LaTeX, Fourth Edition, will prove indispensable to anyone wishing to gain the benefits of LaTeX. The accompanying CD-ROM is part of the TeX Live set distributed by TeX Users Groups, containing a full LaTeX installation for Windows, MacOSX, and Linux, as well as many extensions, including those discussed in the book. 0321173856B10162003
    Note: Accompanying computer disk has title: "TEX Live 2003.". - Includes bibliographical references (p. 557-558) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Boston : Addison-Wesley
    ISBN: 9780132466004 , 0132466007
    Language: English
    Pages: 1 online resource (xiii, 719 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Addison-Wesley professional computing series
    Parallel Title: Erscheint auch als
    Keywords: UNIX (Computer file) ; Computer programming ; Electronic books ; local
    Abstract: The classic guide to UNIX® programming-completely updated! UNIX application programming requires a mastery of system-level services. Making sense of the many functions-more than 1,100 functions in the current UNIX specification-is a daunting task, so for years programmers have turned to Advanced UNIX Programming for its clear, expert advice on how to use the key functions reliably. An enormous number of changes have taken place in the UNIX environment since the landmark first edition. In Advanced UNIX Programming, Second Edition, UNIX pioneer Marc J. Rochkind brings the book fully up to date, with all-new, comprehensive coverage including: POSIX Solaris™ Linux® FreeBSD Darwin, the Mac™ OS X kernel And more than 200 new system calls Rochkind's fully updated classic explains all the UNIX system calls you're likely to need, all in a single volume! Interprocess communication, networking (sockets), pseudo terminals, asynchronous I/O, advanced signals, realtime, and threads Covers the system calls you'll actually use-no need to plow through hundreds of improperly implemented, obsolete, and otherwise unnecessary system calls! Thousands of lines of example code include a Web browser and server, a keystroke recorder/player, and a shell complete with pipelines, redirection, and background processes Emphasis on the practical-ensuring portability, avoiding pitfalls, and much more! Since 1985, the one book to have for mastering UNIX application programming has been Rochkind's Advanced UNIX Programming. Now completely updated, the second edition remains the choice for up-to-the-minute, in-depth coverage of the essential system-level services of the UNIX family of operating systems.
    Note: Description based on print version record. - Includes bibliographical references (p. 703-704) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321125215
    Language: English
    Pages: xxx, 529 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "Eric Evans has written a fantastic book on how you can make the design of your software match your mental model of the problem domain you are addressing. "His book is very compatible with XP. It is not about drawing pictures of a domain; it is about how you think of it, the language you use to talk about it, and how you organize your software to reflect your improving understanding of it. Eric thinks that learning about your problem domain is as likely to happen at the end of your project as at the beginning, and so refactoring is a big part of his technique. "The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers-it is a future classic." - Ralph Johnson , author of Design Patterns "If you don't think you are getting value from your investment in object-oriented programming, this book will tell you what you've forgotten to do. "Eric Evans convincingly argues for the importance of domain modeling as the central focus of development and provides a solid framework and set of techniques for accomplishing it. This is timeless wisdom, and will hold up long after the methodologies du jour have gone out of fashion." - Dave Collins , author of Designing Object-Oriented User Interfaces "Eric weaves real-world experience modeling-and building-business applications into a practical, useful book. Written from the perspective of a trusted practitioner, Eric's descriptions of ubiquitous language, the benefits of sharing models with users, object life-cycle management, logical and physical application structuring, and the process and results of deep refactoring are major contributions to our field." - Luke Hohmann , author of Beyond Software Architecture "This book belongs on the shelf of every thoughtful software developer." - Kent Beck "What Eric has managed to capture is a part of the design process that experienced object designers have always used, but that we have been singularly unsuccessful as a group in conveying to the rest of the industry. We've given away bits and pieces of this knowledge...but we've never organized and systematized the principles of building domain logic. This book is important." - Kyle Brown , author of Enterprise Java™ Programming with IBM ® WebSphere ® The software development community widely acknowledges that domain modeling is central to software design. Through domain models, software developers are able to express rich functi...
    Note: Includes bibliographical references (p. 515-516) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780415274456
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Women and Journalism offers a rich and comprehensive analysis of the roles, status and experiences of women journalists in the United States and Britain. Drawing on a variety of sources and dealing with a host of women journalists ranging from nineteenth century pioneers to Martha Gellhorn, Kate Adie and Veronica Guerin, the authors investigate the challenges women have faced in their struggle to establish reputations as professionals. This book provides an account of the gendered structuring of journalism in print, radio and television and speculates about women's still-emerging role in online journalism. Their accomplishments as war correspondents are tracked to the present, including a study of the role they played post-September 11th.
    Note: Online resource; Title from title page (viewed June 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780419149507
    Language: English
    Pages: 1 online resource (304 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: A detailed, practical guide (with the backing of the main UK authorities) to the construction and maintenance of sports grounds.
    Note: Online resource; Title from title page (viewed June 2, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780122060939
    Language: English
    Pages: 1 online resource (934 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists continue to document their work in this area, it has become increasingly difficult for professionals and graduate students to understand the essential theory and practicalities well enough to design their own algorithms and systems. This book directly addresses this need. As in earlier editions, E.R. Davies clearly and systematically presents the basic concepts of the field in highly accessible prose and images, covering essential elements of the theory while emphasizing algorithmic and practical design constraints. In this thoroughly updated edition, he divides the material into horizontal levels of a complete machine vision system. Application case studies demonstrate specific techniques and illustrate key constraints for designing real-world machine vision systems. · Includes solid, accessible coverage of 2-D and 3-D scene analysis. · Offers thorough treatment of the Hough Transform—a key technique for inspection and surveillance. · Brings vital topics and techniques together in an integrated system design approach. · Takes full account of the requirement for real-time processing in real applications.
    Note: Online resource; Title from title page (viewed December 22, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780415306973
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book provides a systematic and thorough examination of the Asia-Europe Meeting (ASEM) process which brings together the fifteen EU member states, the European Commission and ten East and Southeast Asian countries. The author not only traces the actual development of the ASEM process, but also contextualises ASEM within three different international relations theoretical frameworks, as viewed by realists, social constructivists and institutionalists.
    Note: Online resource; Title from title page (viewed March 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (96 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: From the novice to the most experienced and senior project manager, triple constraint issues are at the core of the most crucial decisions about a project. The Triple Constraints in Project Management explores the triangle of time, cost, and performance that bounds the universe within which every project must be accomplished – and shows how controlling the hierarchy of constraints can mean the difference between success and failure on virtually any project.
    Note: Online resource; Title from title page (viewed July 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (376 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Designing, implementing, and operating a wireless sensor network involves a wide range of disciplines and many application-specific constraints. To make sense of and take advantage of these systems, a holistic approach is needed—and this is precisely what Wireless Sensor Networks delivers. Inside, two eminent researchers review the diverse technologies and techniques that interact in today’s wireless sensor networks. At every step, they are guided by the high-level information-processing tasks that determine how these networks are architected and administered. Zhao and Guibas begin with the canonical problem of localizing and tracking moving objects, then systematically examine the many fundamental sensor network issues that spring from it, including network discovery, service establishment, data routing and aggregation, query processing, programming models, and system organization. The understanding gained as a result—how different layers support the needs of different applications, and how a wireless sensor network should be built to optimize performance and economy—is sure to endure as individual component technologies come and go. ·Written for practitioners, researchers, and students and relevant to all application areas, including environmental monitoring, industrial sensing and diagnostics, automotive and transportation, security and surveillance, military and battlefield uses, and large-scale infrastructural maintenance. ·Skillfully integrates the many disciplines at work in wireless sensor network design: signal processing and estimation, communication theory and protocols, distributed algorithms and databases, probabilistic reasoning, energy-aware computing, design methodologies, evaluation metrics, and more. ·Demonstrates how querying, data routing, and network self-organization can support high-level information-processing tasks.
    Note: Online resource; Title from title page (viewed July 6, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (256 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication provides an overview of the latest release of WebSphere Business Integration Message Brokers and the new Message Brokers Toolkit for WebSphere Studio. It covers the following topics: - Installing WebSphere Business Integration Message Broker and WebSphere Business Integration Event Broker on Windows - Creating and verifying a default configuration - Developing a simple message flow and message set in the Message Brokers Toolkit - Deploying a message flow application to a broker - Diagnosing and fixing problems The book also describes where to find more information, including product documentation and sample applications.
    Note: Online resource; Title from title page (viewed June 10, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Language: English
    Pages: 1 online resource (452 pages)
    Keywords: Electronic books ; local
    Abstract: ThinkVantage Technologies bring your IBM PCs one step closer to being self-configured, self-optimizing, self-protecting, or self-healing, to help save you time and money throughout the life of your systems. In short, ThinkVantage Technologies let you focus your attention on your business, rather than on your computer. ThinkVantage Technologies are software tools designed to help customers drive down IT support costs (in particular, the cost of a PC in managing and supporting systems after its initial purchase), increase security and decrease the complexity of today’s IT infrastructure. This series of Redbooks will help you install, tailor and configure the IBM ThinkVantage Technologies on IBM and OEM desktops. Using ThinkVantage Technologies, Volume 1: Creating and Deploying Client Systems describes how to create and deploy client systems. The tools covered include: - ImageUltra Builder - System Migration Assistant - Secure Data Disposal - Access Connections - Active Protection System
    Note: Online resource; Title from title page (viewed October 8, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Language: English
    Pages: 1 online resource (608 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication introduces the IBM Application Development Tools for z/OS and OS/390. The first chapter provides a high level overview of each of the products, suitable for any person that requires an introduction to these capabilities. The remainder of the book delivers more technical information, including numerous examples of some of the most commonly used functions of each tool and scenarios of how the tools could be used in an everyday customer environment. The specific application development tools for z/OS and OS/390 covered in this book are: IBM File Manager for z/OS and OS/390, Version 4, Release 1 IBM Fault Analyzer for z/OS and OS/390, Version 4, Release 1 IBM Application Monitor for z/OS and OS/390, Version 2, Release 1 IBM Workload Simulator for z/OS and OS/390, Version 1, Release 1 IBM Debug Tool for z/OS and OS/390, Version 4, Release 1 Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed May 13, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: A systems analysis approach to enterprise network design Master techniques for checking the health of an existing network to develop a baseline for measuring performance of a new network design Explore solutions for meeting QoS requirements, including ATM traffic management, IETF controlled-load and guaranteed services, IP multicast, and advanced switching, queuing, and routing algorithms Develop network designs that provide the high bandwidth and low delay required for real-time applications such as multimedia, distance learning, and videoconferencing Identify the advantages and disadvantages of various switching and routing protocols, including transparent bridging, Inter-Switch Link (ISL), IEEE 802.1Q, IGRP, EIGRP, OSPF, and BGP4 Effectively incorporate new technologies into enterprise network designs, including VPNs, wireless networking, and IP Telephony Top-Down Network Design , Second Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and manageable. Using illustrations and real-world examples, it teaches a systematic method for network design that can be applied to campus LANs, remote-access networks, WAN links, and large-scale internetworks. You will learn to analyze business and technical requirements, examine traffic flow and QoS requirements, and select protocols and technologies based on performance goals. You will also develop an understanding of network performance factors such as network utilization, throughput, accuracy, efficiency, delay, and jitter. Several charts and job aids will help you apply a top-down approach to network design. This Second Edition has been revised to include new and updated material on wireless networks, virtual private networks (VPNs), network security, network redundancy, modularity in network designs, dynamic addressing for IPv4 and IPv6, new network design and management tools, Ethernet scalability options (including 10-Gbps Ethernet, Metro Ethernet, and Long-Reach Ethernet), and networks that carry voice and data traffic. Top-Down Network Design , Second Edition, has a companion website at http://www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building succe...
    Note: Online resource; Title from title page (viewed May 27, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : HRD Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Updated to include coverage of the latest in meeting technology, the second edition of the acclaimed reference for meeting planners is more comprehensive—and useful—than ever. Whether you are a meeting professional or new to event planning...a corporate or association executive or independent consultant...the book synthesize what you need to know to achieve professionalism in the management of conferences, exhibitions, and conventions. Co-author Rudy Wright shares three decades of industry knowledge and experience. He is a professional conference organizer, one of the first to earn the Certified Meeting Professional designation, and founding member/past president of Meeting Professionals International.
    Note: Online resource; Title from title page (viewed November 1, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Language: English
    Pages: 1 online resource (570 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication describes how to install and configure the very latest IBM storage solution and concept, the IBM TotalStorage Network Attached Storage (NAS) Gateway 500, in heterogeneous environments. The IBM TotalStorage NAS Gateway 500 series is an innovative Network Attached Storage device that connects clients and servers on an IP network to Fibre Channel storage, efficiently bridging the gap between LAN storage needs and SAN storage capacities. The IBM TotalStorage NAS Gateway 500 is a storage solution for UNIX/AIX/Linux, Apple, and Microsoft Windows environments. In this book, we show how to integrate the IBM TotalStorage NAS Gateway 500 and explain how it can benefit your company’s business needs. This book is an easy-to-follow guide which describes the market segment that the IBM TotalStorage NAS Gateway 500 is aimed at, and explains NAS installation, ease-of-use, remote management, expansion capabilities, high availability (two node clustering and up to four node remote mirroring), and backup and recovery techniques. It also explains open systems storage concepts and methodologies for common data sharing for UNIX/AIX/Linux, Apple, and Microsoft Windows environments. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed October 29, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Reduce costs, improve efficiencies, and focus on your core business Leverage your technology infrastructure to save money and virtualize processes. Discover the principles behind BPV and the ways in which they can benefit your business. Benefit from incremental cost savings, maximizing your business' ROI. Learn from real-world case studies that illustrate best practices. Understand the solution-provider market, maximizing the impact of your investment. The dot-com collapse generally discredited the idea of leveraging the Internet to build viable businesses. Many market pundits have decried the concept without examining the underlying dynamics associated with these companies' failures. The truth is, prior business models were built on a flawed business case, not bad technology. In fact, the dot-com bubble created a whole new class of automation that, when applied to conventional businesses, can dramatically improve time to market, competitive response, and customer interaction. This is not virtual business; this is business process virtualization (BPV), and enterprises that don't grasp and apply the principals of BPV will rapidly be rendered obsolete by those that do, being quickly outmaneuvered and displaced in the market. BPV is the application of networked, intelligent IT infrastructure to enhance skilled personnel, processes, and assets, which enables companies to improve efficiencies, increase competitive advantage, heighten brand awareness, reduce costs, and improve bottom line revenues. Unlike business process automation, BPV focuses on new management approaches for personnel and technology, signaling a fundamental change in the way that we think about business and its objectives. While reading The Case for Virtual Business Processes , you will understand why BPV is critical to the long-term viability of your business, while learning how to leverage your intelligent networked infrastructure using leading-edge products and technologies from Cisco Systems. This volume is in the Network Business Series offered by Cisco Press. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information on today's most important technologies and business strategies.
    Note: Online resource; Title from title page (viewed March 2, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Rockport Publishers | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (208 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Clients the world over turn to graphic designers to help them create standout brochures.
    Note: Online resource; Title from title page (viewed November 1, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (504 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The new Microsoft Certified Desktop Support Technician (MCDST) credential proves that you have the skills to successfully support end users and successfully troubleshoot desktop environments running on Windows XP. MCDST candidates must pass two core exams (70-271 and 70-272). The 70-271 exam, when combined with the 70-272 (the application exam for desktop support technicians), validates that a candidate can successfully answer (or escalate) all calls from end users. Co-written by best-selling author Dan Balter, the MCDST 70-271 Exam Cram 2 gives readers the essential information they need to know to pass this exam, focusing on exactly what they need to know. This book can be used as a sole study guide for those experienced with Windows XP or it is the perfect supplement guide for more comprehensive training materials, instructor-led classes, and/or computer-based training.
    Note: Online resource; Title from title page (viewed July 15, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (414 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Software Design for Engineers and Scientists integrates three core areas of computing: . Software engineering - including both traditional methods and the insights of 'extreme programming' . Program design - including the analysis of data structures and algorithms . Practical object-oriented programming Without assuming prior knowledge of any particular programming language, and avoiding the need for students to learn from separate, specialised Computer Science texts, John Robinson takes the reader from small-scale programing to competence in large software projects, all within one volume. Copious examples and case studies are provided in C++ and students can access complementary examples in Java on an accompanying website. The book is especially suitable for undergraduates in the natural sciences and all branches of engineering who have some knowledge of computing basics, and now need to understand and apply software design to tasks like data analysis, simulation, signal processing or visualisation. John Robinson introduces both software theory and its application to problem solving using a range of design principles, applied to the creation of medium-sized systems, providing key methods and tools for designing reliable, efficient, maintainable programs. The case studies are presented within scientific contexts to illustrate all aspects of the design process, allowing students to relate theory to real-world applications. All listings are available on this book’s companion website. · Core computing topics - usually found in separate specialised texts - presented to meet the specific requirements of science and engineering students · Demonstrates good practice through applications, case studies and worked examples based in real-world contexts · Additional website resources are available, including useful links and further worked examples using Java
    Note: Online resource; Title from title page (viewed October 1, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (184 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With more and more physicists and physics students exploring the possibility of utilizing their advanced math skills for a career in the finance industry, this much-needed book quickly introduces them to fundamental and advanced finance principles and methods. Quantitative Finance for Physicists provides a short, straightforward introduction for those who already have a background in physics. Find out how fractals, scaling, chaos, and other physics concepts are useful in analyzing financial time series. Learn about key topics in quantitative finance such as option pricing, portfolio management, and risk measurement. This book provides the basic knowledge in finance required to enable readers with physics backgrounds to move successfully into the financial industry. * Short, self-contained book for physicists to master basic concepts and quantitative methods of finance * Growing field—many physicists are moving into finance positions because of the high-level math required *Draws on the author's own experience as a physicist who moved into a financial analyst position
    Note: Online resource; Title from title page (viewed December 14, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Language: English
    Pages: 1 online resource (436 pages)
    Keywords: Electronic books ; local
    Abstract: The Patterns for e-business are a group of proven, reusable assets that can be used to increase the speed of developing and deploying Web applications. This IBM Redbooks publication focuses on business process application integration using the Process-focused Application Integration::Serial and Parallel Process Application patterns for intra-enterprise. Part 1 guides you through the process of selecting an Application and Runtime pattern. Next, the platform-specific Product mappings are identified based upon the selected Runtime pattern. The Runtime and Product mapping patterns in this book focus on the Serial and Parallel Process patterns. Part 2 presents guidelines on applying the Patterns approach to a sample business scenario and on selecting application integration technologies. It also describes the capabilities of WebSphere Process Choreographer and WebSphere MQ Workflow . Part 3 provides detailed design, development, and runtime guidelines for five scenarios, each implemented using WebSphere Process Choreographer and WebSphere MQ Workflow . These implementations focus on automated Web service activities and human interaction activities. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed April 23, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Language: English
    Pages: 1 online resource (216 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication provides information related to the viability of Linux as a client platform. It targets technical personnel who are involved in evaluating Linux as a possible client platform. It also targets administrators and support personnel who are responsible for supporting client systems. This book can also be helpful to anyone who is evaluating the potential of using Linux for enterprise client systems. However, the key focus is on environments where OS/2 is currently used. Many enterprises have been using OS/2 as a stable platform for critical enterprise client applications. However, as those enterprises look to the future, they look for a platform on which they can build a strategy that is open, standards-based, secure, and provides a cost-effective solution. Linux has become successful as a server platform in many of these same enterprises. It comes as no surprise that these enterprises also want to evaluate the possibility of including Linux for many of their client systems. This book describes platform and functional considerations for choosing Linux as a client platform. It examines techniques and facilities for administering Linux clients, coexistence of Linux clients with other platforms, and a technique to easily install Linux clients based on the well-known OS/2-based CID methodology. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed March 31, 2004) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...